ID |
CVE-2021-38649
|
Summary |
Open Management Infrastructure Elevation of Privilege Vulnerability |
References |
|
Vulnerable Configurations |
-
cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_diagnostics_\(lad\):-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_diagnostics_\(lad\):-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*
-
cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*
cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*
|
CVSS |
Base: | 4.6 (as of 28-12-2023 - 20:16) |
Impact: | |
Exploitability: | |
|
CWE |
NVD-CWE-noinfo |
CAPEC |
|
Access |
Vector | Complexity | Authentication |
LOCAL |
LOW |
NONE |
|
Impact |
Confidentiality | Integrity | Availability |
PARTIAL |
PARTIAL |
PARTIAL |
|
cvss-vector
via4
|
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
Last major update |
28-12-2023 - 20:16 |
Published |
15-09-2021 - 12:15 |
Last modified |
28-12-2023 - 20:16 |