A spoofing vulnerability exists when System Center Operations Manager (SCOM) does not properly sanitize a specially crafted web request to an affected SCOM 2016 Web Console instance. An authenticated attacker could exploit the vulnerability by sending a specially crafted request to an affected SCOM 2016 Web Console instance. The attacker who successfully exploited the vulnerability could then perform cross-site scripting attacks on affected systems and run script in the security context of the current user. These attacks could allow the attacker to read content that the attacker is not authorized to read, use the victim's identity to take actions on the SCOM 2016 Web Console instance on behalf of the user, such as change permissions and delete content, and inject malicious content in the browser of the user. The security update addresses the vulnerability by helping to ensure that System Center Operations Manager properly sanitizes input.
In what instances do I need to install the security update for this vulnerability? This vulnerability only affects machines that have the SCOM 2016 web console installed. SCOM 2016 web console server machines should have this update installed to be protected from the vulnerability. Do I need to install the update if my machine is not set up as a web console server? No. Customers whose machines are not SCOM 2016 web console server machines do not need to install this update.
<a href="https://twitter.com/tdimbarre">Thiago Luiz Dimbarre</a>