Virtual Event Today: Supply Chain Security Summit - Join Event In-Progress

Security Experts:

Connect with us

Hi, what are you looking for?



Attacks Targeting OMIGOD Vulnerability Ramping Up

Attackers are increasingly targeting a remote code execution vulnerability in the Open Management Infrastructure (OMI) framework that Microsoft released patches for earlier this month.

Attackers are increasingly targeting a remote code execution vulnerability in the Open Management Infrastructure (OMI) framework that Microsoft released patches for earlier this month.

Dubbed OMIGOD and tracked as CVE-2021-38647, this critical vulnerability was found to affect the Linux virtual machines deployed on Azure. In addition to fixes released with its September 2021 Patch Tuesday updates, Microsoft last week released additional mitigations for this bug and three elevation of privilege flaws impacting OMI.

Microsoft says that Azure customers with automatic updates enabled should receive the necessary fixes within days, while others should manually update their installations. Other Linux distributions that have the Azure/SCOM/OMS agents installed are also at risk, Pwndefend says.

Security researcher Kevin Beaumont, however, warns that Microsoft failed to apply the patches for new deployments, and that the manner in which the tech giant approached the delivery of patches is not as straightforward as expected.

Unsurprisingly, less than a week after the vulnerability was publicly disclosed (Microsoft actually pushed fixes to the OMI source code on August 12), attacks targeting CVE-2021-38647 are ramping up.

This is what usually happens when critical, highly impactful security defects are made public, but things seem especially grim for this bug in particular, because exploitation is rather trivial.

“Rather than guessing a valid authentication token to insert into a fraudulent OMI web request, you simply omit all mention of the authentication token altogether, and you’re in,” Sophos explains.

The good news is that there aren’t as many Internet-facing vulnerable deployments as has recently happened with similar vulnerabilities. According to Censys, there are 101 known exposed services worldwide potentially at risk, which includes a major health entity and two major entertainment organizations.

“The small footprint can be associated with nuances of how the OMI service responds, and that exposing OMI to the Internet likely requires deliberate effort,” Censys points out.

Security researchers monitoring the activity surrounding OMIGOD warn of an increasing number of exploitation attempts targeting the bug.

Microsoft too has observed the behavior, saying it ranges from host enumeration to attacks aimed at installing cryptocurrency miners or other types of malware. The tech giant is also aware of reports that cybercriminals have exploited the flaw to install a Mirai variant.

“While many of the attackers are looking for port 5986, we are also seeing attacks on port 1270. Due to the number of easily adaptable proof of concept exploits available and the volume of reconnaissance-type attacks, we are anticipating an increase in the number of effects-type attacks,” the company says.

Related: Patch Tuesday: Microsoft Plugs Exploited MSHTML Zero-Day Hole

Related: Critical Vulnerability Exposed Azure Cosmos DBs for Months

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Zendesk is informing customers about a data breach that started with an SMS phishing campaign targeting the company’s employees.


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...


The release of OpenAI’s ChatGPT in late 2022 has demonstrated the potential of AI for both good and bad.


Satellite TV giant Dish Network confirmed that a recent outage was the result of a cyberattack and admitted that data was stolen.


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Application Security

PayPal is alerting roughly 35,000 individuals that their accounts have been targeted in a credential stuffing campaign.


No one combatting cybercrime knows everything, but everyone in the battle has some intelligence to contribute to the larger knowledge base.


A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...