CVE-2023-36043: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft System Center Operations Manager (SCOM) 2022
Open Management Infrastructure Information Disclosure Vulnerability
AI Analysis
Technical Summary
CVE-2023-36043 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft System Center Operations Manager (SCOM) 2022, specifically version 10.22.0. The flaw involves the Open Management Infrastructure component, where sensitive information is improperly protected, allowing an attacker with low privileges to access confidential data without requiring user interaction. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack requires local access with low complexity and privileges, no user interaction, and the scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is high on confidentiality but does not affect integrity or availability. Although no public exploits are known, the vulnerability could be leveraged by insiders or attackers who have gained limited access to the system to gather sensitive information that could facilitate further attacks or reconnaissance. The vulnerability was reserved in June 2023 and published in November 2023, with no current patch links provided, indicating that remediation may be pending or in progress. The vulnerability affects a critical monitoring tool widely used in enterprise environments to oversee IT infrastructure, making the exposure of sensitive data potentially impactful for operational security.
Potential Impact
For European organizations, the exposure of sensitive information in SCOM 2022 could lead to unauthorized disclosure of operational data, configuration details, or credentials that attackers could use to escalate privileges or move laterally within networks. This risk is particularly significant for sectors relying heavily on Microsoft infrastructure monitoring, such as finance, manufacturing, energy, and government agencies. The confidentiality breach could undermine trust, violate data protection regulations like GDPR if personal or sensitive data is involved, and increase the risk of subsequent targeted attacks. Since the vulnerability requires local access with low privileges, the threat is higher in environments where multiple users have access to SCOM servers or where attackers can gain foothold through other means. The lack of impact on integrity and availability limits immediate operational disruption but does not diminish the strategic risk posed by information leakage.
Mitigation Recommendations
Organizations should implement strict access controls to limit low-privilege user access to SCOM servers and related management infrastructure. Network segmentation and the principle of least privilege should be enforced to reduce the attack surface. Monitoring and auditing access logs for unusual or unauthorized access attempts to SCOM components can help detect exploitation attempts early. Until an official patch is released, consider applying temporary compensating controls such as disabling or restricting vulnerable features or interfaces within SCOM that handle sensitive information. Regularly update and review security policies related to privileged and non-privileged user roles. Engage with Microsoft support channels to obtain timely patches or workarounds. Additionally, conduct internal security awareness training to reduce insider threat risks and ensure rapid incident response capabilities are in place.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain
CVE-2023-36043: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Microsoft System Center Operations Manager (SCOM) 2022
Description
Open Management Infrastructure Information Disclosure Vulnerability
AI-Powered Analysis
Technical Analysis
CVE-2023-36043 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting Microsoft System Center Operations Manager (SCOM) 2022, specifically version 10.22.0. The flaw involves the Open Management Infrastructure component, where sensitive information is improperly protected, allowing an attacker with low privileges to access confidential data without requiring user interaction. The CVSS 3.1 vector (AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N) indicates that the attack requires local access with low complexity and privileges, no user interaction, and the scope is changed, meaning the vulnerability affects resources beyond the initially vulnerable component. The impact is high on confidentiality but does not affect integrity or availability. Although no public exploits are known, the vulnerability could be leveraged by insiders or attackers who have gained limited access to the system to gather sensitive information that could facilitate further attacks or reconnaissance. The vulnerability was reserved in June 2023 and published in November 2023, with no current patch links provided, indicating that remediation may be pending or in progress. The vulnerability affects a critical monitoring tool widely used in enterprise environments to oversee IT infrastructure, making the exposure of sensitive data potentially impactful for operational security.
Potential Impact
For European organizations, the exposure of sensitive information in SCOM 2022 could lead to unauthorized disclosure of operational data, configuration details, or credentials that attackers could use to escalate privileges or move laterally within networks. This risk is particularly significant for sectors relying heavily on Microsoft infrastructure monitoring, such as finance, manufacturing, energy, and government agencies. The confidentiality breach could undermine trust, violate data protection regulations like GDPR if personal or sensitive data is involved, and increase the risk of subsequent targeted attacks. Since the vulnerability requires local access with low privileges, the threat is higher in environments where multiple users have access to SCOM servers or where attackers can gain foothold through other means. The lack of impact on integrity and availability limits immediate operational disruption but does not diminish the strategic risk posed by information leakage.
Mitigation Recommendations
Organizations should implement strict access controls to limit low-privilege user access to SCOM servers and related management infrastructure. Network segmentation and the principle of least privilege should be enforced to reduce the attack surface. Monitoring and auditing access logs for unusual or unauthorized access attempts to SCOM components can help detect exploitation attempts early. Until an official patch is released, consider applying temporary compensating controls such as disabling or restricting vulnerable features or interfaces within SCOM that handle sensitive information. Regularly update and review security policies related to privileged and non-privileged user roles. Engage with Microsoft support channels to obtain timely patches or workarounds. Additionally, conduct internal security awareness training to reduce insider threat risks and ensure rapid incident response capabilities are in place.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- microsoft
- Date Reserved
- 2023-06-20T20:44:39.828Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d983bc4522896dcbee4f6
Added to database: 5/21/2025, 9:09:15 AM
Last enriched: 10/9/2025, 12:23:09 AM
Last updated: 12/4/2025, 4:39:30 PM
Views: 30
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66516: CWE-611 Improper Restriction of XML External Entity Reference in Apache Software Foundation Apache Tika core
CriticalCVE-2025-65516: n/a
HighCVE-2025-61148: n/a
UnknownCVE-2025-57213: n/a
UnknownCVE-2025-57212: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.