Solved

CIM software risks

Posted on 2014-02-24
4
264 Views
Last Modified: 2014-02-26
Albeit not from an infrastructure role myself, most server hardware seems to come with some sort of management (CIM) application, from a risk angle (my role), can anyone give a beginners guides of risks posed if an unauthorised user got say admin access to the CIM for a given server, i.e. what does/would it let you do if you had malicious intentions?
0
Comment
Question by:pma111
  • 2
4 Comments
 
LVL 79

Assisted Solution

by:David Johnson, CD, MVP
David Johnson, CD, MVP earned 250 total points
ID: 39884707
CIM is the industry standard of WMI access, they can do a lot of mischief if they have malicious intentions.
0
 
LVL 22

Accepted Solution

by:
eeRoot earned 250 total points
ID: 39884712
Most admin tools have SNMP access.  And perhaps WMI, telnet, or SSH access as well.  These protocols can allow for everything from reading current system info to making admin/root level changes.  Admin and monitoring tools can be configured for read only access, but a competent hacker can grant themselves an admin role and then have full control, even if the approved admins only have limited access.  Admin and monitoring tools should always be fully patched, access to these tools should be limited, both successful and unsuccessful logins should be logged and reviewed, and changed made by these tools should be logged and reviewed.
0
 
LVL 3

Author Comment

by:pma111
ID: 39884972
>they can do a lot of mischief if they have malicious intentions.

could you provide some examples to assist in our risk assessment?
0
 
LVL 22

Expert Comment

by:eeRoot
ID: 39885841
Anything from reading data to modifying, copying, or deleting data.  Setting up admin access for themselves, installing backdoor access, etc
0

Featured Post

NAS Cloud Backup Strategies

This article explains backup scenarios when using network storage. We review the so-called “3-2-1 strategy” and summarize the methods you can use to send NAS data to the cloud

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
How to get maximum transfer speed over LAN 4 84
Converting TV to Network (Muli-User) Web front. 8 65
Dell Server drives 9 61
NIC on Proliant 4 26
Does your iMac really need a hardware upgrade? Will upgrading RAM speed-up your computer? If yes, then how can you proceed? Upgrading RAM in your iMac is not as simple as it may seem. This article will help you in getting and installing right RA…
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
A short tutorial showing how to set up an email signature in Outlook on the Web (previously known as OWA). For free email signatures designs, visit https://www.mail-signatures.com/articles/signature-templates/?sts=6651 If you want to manage em…

831 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question