Tag
#Open Management Infrastructure
**What privileges could be gained by an attacker who successfully exploited this vulnerability?** Successful exploitation of this vulnerability will locally elevate the attacker's privileges to communicate as Root with OMI server.
**How could an attacker exploit this vulnerability?** A remote unauthenticated attacker could access the OMI instance from the Internet and send specially crafted requests to trigger a use-after-free vulnerability.
**According to the CVSS metric, a successful exploitation could lead to a scope change (S:C). What does this mean for this vulnerability?** An attacker who successfully exploits this vulnerability could affect resources beyond the security scope managed by the security authority of the vulnerable component. In this case, the vulnerable component could be different from the impacted component and are managed by different security authorities.