Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges. How could an attacker exploit this vulnerability? An attacker with any valid SCOM login could create a custom dashboard containing a PowerShell widget, allowing them to run commands on the web console server.
<a href="https://x.com/unsigned_sh0rt">Garrett Foster</a> with <a href="https://specterops.io/">SpecterOps</a>