Solved

CIM software risks

Posted on 2014-02-24
4
261 Views
Last Modified: 2014-02-26
Albeit not from an infrastructure role myself, most server hardware seems to come with some sort of management (CIM) application, from a risk angle (my role), can anyone give a beginners guides of risks posed if an unauthorised user got say admin access to the CIM for a given server, i.e. what does/would it let you do if you had malicious intentions?
0
Comment
Question by:pma111
  • 2
4 Comments
 
LVL 78

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 250 total points
ID: 39884707
CIM is the industry standard of WMI access, they can do a lot of mischief if they have malicious intentions.
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 39884712
Most admin tools have SNMP access.  And perhaps WMI, telnet, or SSH access as well.  These protocols can allow for everything from reading current system info to making admin/root level changes.  Admin and monitoring tools can be configured for read only access, but a competent hacker can grant themselves an admin role and then have full control, even if the approved admins only have limited access.  Admin and monitoring tools should always be fully patched, access to these tools should be limited, both successful and unsuccessful logins should be logged and reviewed, and changed made by these tools should be logged and reviewed.
0
 
LVL 3

Author Comment

by:pma111
ID: 39884972
>they can do a lot of mischief if they have malicious intentions.

could you provide some examples to assist in our risk assessment?
0
 
LVL 22

Expert Comment

by:eeRoot
ID: 39885841
Anything from reading data to modifying, copying, or deleting data.  Setting up admin access for themselves, installing backdoor access, etc
0

Featured Post

New! My Passport Wireless Pro Wi-Fi Mobile Storage

Portable wireless storage to offload, edit, and stream anywhere.

High-capacity, wireless mobile storage designed to accompany professional photographers and videographers in the field to easily offload, edit and stream captured photos and high-definition videos.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Monitor input from a computer is usually nothing special.  In this instance it prevented anyone from using the computer.  This was a preconfiguration that didn't work.
Learn about cloud computing and its benefits for small business owners.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
This tutorial gives a high-level tour of the interface of Marketo (a marketing automation tool to help businesses track and engage prospective customers and drive them to purchase). You will see the main areas including Marketing Activities, Design …

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

19 Experts available now in Live!

Get 1:1 Help Now