Description
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
Published: 2026-03-10
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Apply Patch
AI Analysis

Impact

Improper input validation in Microsoft System Center Operations Manager (SCOM) allows an attacker who has authorized access to the system to elevate their privileges over a network. The vulnerability could enable a low‑privileged user to gain additional rights and potentially execute arbitrary commands or actions within the SCOM environment, thereby compromising confidentiality, integrity, and availability of monitoring data and related resources. The weakness is identified as CWE‑20, reflecting an improper input validation flaw.

Affected Systems

The affected products are Microsoft System Center Operations Manager versions 2019, 2022, and 2025. All update rollups listed in the CPE data are potentially vulnerable, meaning any installation of these product releases prior to the Microsoft patch referenced in the advisory is susceptible. No specific patch release numbers are provided in the CVE entry, but the vendor advisory URL indicates that Microsoft has issued a fix for these releases.

Risk and Exploitability

The CVSS score of 8.8 denotes high severity, with a low EPSS probability (<1%) suggesting that exploitation is unlikely in the near term. The vulnerability is not listed in the CISA KEV catalog, further indicating moderate risk. Based on the description, the likely attack vector is network‑based, requiring the attacker to be authenticated with at least some authorized access to the SCOM environment; from that position the attacker could supply crafted input to trigger the privilege escalation. No official workaround is provided by Microsoft, emphasizing the need for timely patching.

Generated by OpenCVE AI on March 16, 2026 at 23:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Microsoft SCOM update for the affected 2019, 2022, or 2025 release, as detailed in the Microsoft advisory.
  • Verify that the patch has been successfully applied on all SCOM servers.
  • Restrict network access to SCOM management components until the patch is deployed to prevent potential exploitation.
  • Monitor SCOM logs and security alerts for any anomalous privilege escalation activity.

Generated by OpenCVE AI on March 16, 2026 at 23:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Microsoft system Center Operations Manager
CPEs cpe:2.3:a:microsoft:system_center_operations_manager:2019:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_1:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_1_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_2:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_2_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_3:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_3_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_4:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_4_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_5:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_5_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2019:update_rollup_6:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:update_rollup_1:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:update_rollup_1_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:update_rollup_2:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:update_rollup_2_hotfix:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2022:update_rollup_3:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2025:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager:2025:update_rollup_1:*:*:*:*:*:*
Vendors & Products Microsoft system Center Operations Manager

Tue, 10 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Mar 2026 17:30:00 +0000

Type Values Removed Values Added
Description Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.
Title System Center Operations Manager (SCOM) Elevation of Privilege Vulnerability
First Time appeared Microsoft
Microsoft system Center Operations Manager 2019
Microsoft system Center Operations Manager 2022
Microsoft system Center Operations Manager 2025
Weaknesses CWE-20
CPEs cpe:2.3:a:microsoft:system_center_operations_manager_2019:*:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager_2022:*:-:*:*:*:*:*:*
cpe:2.3:a:microsoft:system_center_operations_manager_2025:*:-:*:*:*:*:*:*
Vendors & Products Microsoft
Microsoft system Center Operations Manager 2019
Microsoft system Center Operations Manager 2022
Microsoft system Center Operations Manager 2025
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C'}


Subscriptions

Microsoft System Center Operations Manager System Center Operations Manager 2019 System Center Operations Manager 2022 System Center Operations Manager 2025
cve-icon MITRE

Status: PUBLISHED

Assigner: microsoft

Published:

Updated: 2026-03-27T22:32:56.237Z

Reserved: 2025-12-04T20:04:16.341Z

Link: CVE-2026-20967

cve-icon Vulnrichment

Updated: 2026-03-10T18:01:52.386Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-10T18:18:05.987

Modified: 2026-03-13T17:11:29.083

Link: CVE-2026-20967

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:34:20Z

Weaknesses