https://safirsoft.com Wiz security researchers have discovered another major vulnerability in Azure

An unknown management service granted root access to attackers without authentication.

Read more "The Worst Cloud Vulnerability Imaginable" Discovered at Wiz Security vendor Microsoft AzureCloud - which recently made headlines with the discovery of a large-scale vulnerability in the CosmosDB database service operated by Microsoft Azure - has found another hole in Azure.

A new vulnerability affects Azure Linux virtual machines. It is installed with an unknown service called OMI, which as a byproduct is able to report and/or manage Azure UI login options.

In the worst case, the OMI vulnerability can be traced back to remote root code execution - although fortunately, Azure Firewall by default, outside of the virtual machine, is limited to most clients' internal networks.

OMIGOD

Select the option of any of the many attractive Azure Infrastructure Services (such as distributed logging) to automatically install an unknown service within your desired Azure VM. The service, OMI - which stands for Open Management Interface - is intended to work like Microsoft's WMI service, enabling a range of reports and metrics, as well as some remote management.

Part of the OMI specification requires authentication in order to associate commands and requests with a specific user identifier (UID) - but unfortunately, an error caused incomplete requests to leave the authentication scope that will be automatically accepted by the origin user.

When OMI, configured for remote administration, runs an HTTPS server on port 5986, which can connect to a standard HTTPS client such as curl and accept human-readable commands in an XML-derived SOAP protocol. In other configurations, OMI runs only on a local Unix socket in /var/opt/omi/run/omiserver.sock , which restricts its use to only local users. By showing this vulnerability, describing it further in terms of logging - an attacker who investigates anything in a corrupted virtual machine can use the OMI syntax to issue any command as root.

In larger environments where OMI is listening on the network port, not just the local Unix socket, this is a great way to turn to the side - an attacker shell on a virtual machine on an Azure LAN, and can usually use the buggy OMI to control in anything. Another virtual machine in the same network sector. Organizations that agree to Microsoft System Center (announced on every new installation of Windows Server 2019 and later) and manage Linux hosts on or off their own, are terminated with a buggy version of OMI on the installed managed hosts.

When Nir and I talked about the vulnerability, it's possible that some Azure clients have enabled UI login and added a "default authorization" rule to the Azure Linux VM firewall "Of course this is a bug, but it did. I screamed, 'Oh my God,' and Tim Wise burst out laughing. As it turns out, this is exactly what they called this vulnerability - OMIGOD.

Collecting Difficulty Rewards

Despite the apparent risk of OMIGOD—which includes four separate but related models discovered by Wise—the company has run into problems for Microsoft to responsibly disclose and disclose its pay rewards. In a series of emails from Ars reviewed, Microsoft representatives initially dismissed the vulnerabilities as being "off limits" with Azure. According to Weiss, Microsoft representatives in a phone call described the bugs in OMI as an "open source" issue.

This claim is compounded by the fact that Microsoft originally founded OMI, an open group, in 2012. Since then, the vast majority of commitments to OMI have come from Redmond operating partners. Done at Microsoft - open source or not, this is clearly a Microsoft project.

In addition to Microsoft's actual ownership of the project, Azure's management system automatically deploys OMI - managers are not required to hit the command line and install the package for themselves. Instead, when an OMI-based option on Azure GUI is clicked, it is automatically deployed within the virtual machine.

Even when managing an Azure OMI deployment, there is not much clear information about the device administrator. We've found that most Azure admins only realize that OMI is there if their var / partition is full of the original dump. With a total of $70,000 for the four forms included. Dust Corner in the Supply Chain

Offfield told Ars. "OMI is similar to the Linux implementation of the Windows Management Infrastructure." Our assumption is that when they went to the cloud and had to support Linux devices, they wanted to bridge the gap and provide the same interface to the devices. Windows and Linux.

OMI's integration into Azure Management - and at the heart of the Microsoft system, which is announced right at every new installation of Windows Server - means it's a low-level component. It installs on a surprising number of very important Linux machines. , virtual machines, etc. The fact that in some configurations it listens for open network port commands using common protocols (SOAP over HTTPS) makes it a very attractive target for attackers.

Advertising

With both deployment and potential vulnerabilities, One can reasonably expect that there will be a large number of eyeballs on OMI - enough to sum up a single vulnerability once you "forgot to make sure that the user is verified." Unfortunately, this is not the case - OMI has a total of 24 contributors, 90 Negal and 225 "stars" (a relatively typical metric of interest for developers) during his nine years on Github have been very worrisome.

By contrast, my Sanoid ZFS management project - which doesn't listen on any ports and is described inconsequential as "a few thousand lines of perl script" - more than twice the number of contributors, forks, etc. Meet 10 times more stars.

By any logical measure, the critical component of OMI should be given more attention - raising questions about how many corners of the software supply chain are equally scrutinized and vetted. - Preserved.

Unspecified upgrade path

Microsoft employee Deepak Jane modified the GitHub OMI repository on August 11th - but as Ars directly confirmed, these fixes haven't been applied to Azure since September 13th. Microsoft told Wiz that it will announce the fight against violent extremism on Tuesday, but Wiz researchers aren't clear about how or when the reforms will be implemented globally. "Microsoft has not shared its downgrade plan with us," Amy Luttwak of Wiz CTO told Ars. Azure is built in, and each may require a different upgrade path. Because Linux proxies for System Center are outdated. Customers still using System Center with Linux that supports OMI may need to manually update the OMI proxy. Since you can run OMI, you can search for listening ports in TCP 5985 and 5986 (TCP 1270, for OMI proxies based on Microsoft System Center instead of Azure) or the Unix socket below /var/opt/omi.

If you have a Unix socket but no ports, you're still at risk until Microsoft installs a patch - but the domain is limited to increasing local privileges.

When OMI listens on TCP ports, it connects to all interfaces, including public ones. We recommend restricting access to these ports through the Linux Firewall, whether or not the OMI instance is fixed.

In particular, secure administrators should restrict access to this network and other network services only to that network. Sections that really need access. Apparently, machines running Microsoft System Center need Olient in client systems, like Azure's infrastructure - but the clients themselves don't need each other's OMI access.

The best way to reduce surface network attacks - with this service and any potentially vulnerable service - is a blanket firewall denial rule, with special rules allowed only for devices that need access to a particular service.

In cases where this does not work - for example, in an Azure environment where the administrator is not sure what Microsoft network components need to properly access the OMI - you simply cannot access other virtual machines in the same part of the The network, at least prevents attackers from moving sideways from the device. etc.

Wiz security researchers have discovered another major vulnerability in Azure
wiz-security-researchers-have-discovered-another-major.html

https://safirsoft.com Elan Musk says SpaceX Starlink will be out of beta next month

Elan Musk says SpaceX Starlink will be out of beta next month

With 600,000 orders, SpaceX has increased container production (hopefully) to meet demand.

The Starlink SpaceX satellite bandwidth service wi...

https://safirsoft.com $3M Supply Chain Under Attack by Crypto Startup

$3M Supply Chain Under Attack by Crypto Startup

The MISO SushiSwap launch page has been hacked by a malicious GitHub commit. SushiSwap is a decentralized, community-based financial (DeFi) platform t...
https://safirsoft.com Telegram is emerging as a new network of darkness for cybercriminals

Telegram is emerging as a new network of darkness for cybercriminals

More and more hackers are sharing their information in encrypted messaging apps.

Telegram has expanded as a hub for cybercriminals seeking to...

https://safirsoft.com Anonymous leaks 1 gigabyte of data from Epik, web host Gab and Parler

Anonymous leaks 1 gigabyte of data from Epik, web host Gab and Parler

Hackers attacked Epic just days after the Texas Republican Party website was demolished over the abortion law. Wings locations The stolen data was pos...
https://safirsoft.com Travis CI flaw reveals secrets of thousands of open source projects

Travis CI flaw reveals secrets of thousands of open source projects

Developers are angry at Travis CI's highly embarrassing "security bulletin". Travis CI is a software testing solution used by over 900,000 open source...
https://safirsoft.com Apple Fixes iMessage for the Day Exploited by Pegasus Spyware

Apple Fixes iMessage for the Day Exploited by Pegasus Spyware

The zero click defect has been exploited by the NSO since at least February 2021. The "Zero Click, Zero Day" vulnerability has been actively exploited...