-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
NVD Vulnerability Details :
CVE-2021-38649
Analyzed
More Info
Official Page
Source
-
secure@microsoft.com
View Known Exploited Vulnerability (KEV) details
Published At
-
15 Sep, 2021 | 12:15
Updated At
-
30 Oct, 2025 | 19:16
Open Management Infrastructure Elevation of Privilege Vulnerability
CISA Catalog
Date Added
Due Date
Vulnerability Name
Required Action
2021-11-03
2021-11-17
Microsoft Open Management Infrastructure (OMI) Privilege Escalation Vulnerability
Apply updates per vendor instructions.
Date Added:
2021-11-03
Due Date:
2021-11-17
Vulnerability Name:
Microsoft Open Management Infrastructure (OMI) Privilege Escalation Vulnerability
Required Action:
Apply updates per vendor instructions.
Metrics
Type
Version
Base score
Base severity
Vector
Secondary
3.1
7.0
HIGH
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Secondary
3.1
7.8
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Primary
2.0
4.6
MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
Type:
Secondary
Version:
3.1
Base score:
7.0
Base severity:
HIGH
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
Type:
Secondary
Version:
3.1
Base score:
7.8
Base severity:
HIGH
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Type:
Primary
Version:
2.0
Base score:
4.6
Base severity:
MEDIUM
Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CPE Matches
Microsoft Corporation
microsoft
>>
azure_automation_state_configuration
>>
-
cpe:2.3:a:microsoft:azure_automation_state_configuration:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_automation_update_management
>>
-
cpe:2.3:a:microsoft:azure_automation_update_management:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_diagnostics_\(lad\)
>>
-
cpe:2.3:a:microsoft:azure_diagnostics_\(lad\):-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_open_management_infrastructure
>>
-
cpe:2.3:a:microsoft:azure_open_management_infrastructure:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_security_center
>>
-
cpe:2.3:a:microsoft:azure_security_center:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_sentinel
>>
-
cpe:2.3:a:microsoft:azure_sentinel:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
azure_stack_hub
>>
-
cpe:2.3:a:microsoft:azure_stack_hub:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
container_monitoring_solution
>>
-
cpe:2.3:a:microsoft:container_monitoring_solution:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
log_analytics_agent
>>
-
cpe:2.3:a:microsoft:log_analytics_agent:-:*:*:*:*:*:*:*
Microsoft Corporation
microsoft
>>
system_center_operations_manager
>>
-
cpe:2.3:a:microsoft:system_center_operations_manager:-:*:*:*:*:*:*:*
Load More
Weaknesses
CWE ID
Type
Source
NVD-CWE-noinfo
Primary
nvd@nist.gov
CWE ID:
NVD-CWE-noinfo
Type:
Primary
Source:
nvd@nist.gov
Evaluator Description
Evaluator Impact
Evaluator Solution
Vendor Statements
References
Hyperlink
Source
Resource
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649
secure@microsoft.com
Patch
Vendor Advisory
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649
af854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-38649
134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource
Hyperlink:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649
Source:
secure@microsoft.com
Resource:
Patch
Vendor Advisory
Hyperlink:
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2021-38649
Source:
af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2021-38649
Source:
134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
US Government Resource
Change History
0
Changes found
Details not found