7.8
CVSSv3

CVE-2021-38645

Published: 15/09/2021 Updated: 28/12/2023
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 410
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Open Management Infrastructure Elevation of Privilege Vulnerability

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

microsoft system center operations manager -

microsoft azure automation state configuration -

microsoft azure automation update management -

microsoft azure diagnostics (lad) -

microsoft azure open management infrastructure -

microsoft azure security center -

microsoft azure sentinel -

microsoft azure stack hub -

microsoft container monitoring solution -

microsoft log analytics agent -

Github Repositories

Apache Druid JNDI Vulnerable

Apache Druid JNDI Vuln Druid JNDI 注入漏洞利用脚本 本项目是一个利用 Druid JNDI 注入漏洞的 Python 脚本。该漏洞存在于 Druid 的 indexer/v1/sampler 接口中,攻击者可以通过构造恶意请求,在目标服务器上执行任意命令。 This project is a Python script that exploits the Druid JNDI injection vulnerability The vulnerability exis

Script to check for the presence of OMS agents on VMs in Azure

Omigod-Check While recently reading about a critical bug in Azure Linux VMs, I wondered if we were susceptible This script can be run to see which VMs are potentially vulnerable From the article: To make things worse, there is no auto-update mechanism Microsoft can use to update the vulnerable agents on all Azure Linux machines, which means that customers have to upgrade it

OMIGOD-OMSAgentInfo PowerShell Scripts created to detect machines afected by OMI vulnerability: CVE-2021-38645, CVE-2021-38649, CVE-2021-38648, and CVE-2021-38647, based on OMS Agent version from clients Please to check OMI versions inside Azure VMs, refers to this other script: OMIcheck Additional Guidance Regarding OMI Vulnerabilities within Azure VM Management Extensions Ch