all InfoSec news
SCCM Hierarchy Takeover
Sept. 25, 2023, 3 p.m. | MalBot
Malware Analysis, News and Indicators - Latest topics malware.news
One Site to Rule Them All
tl;dr:
There is no security boundary between sites in the same hierarchy.
When an administrative user is granted a security role in SCCM, such as Full Administrator or Infrastructure Administrator, in any primary site, the underlying database changes propagate upward to the central administration site (CAS) and then to other primary sites in the hierarchy.
This means that if an attacker gains control of any primary site, they gain control of the entire …
administration database hierarchy infrastructure role sccm security takeover
More from malware.news / Malware Analysis, News and Indicators - Latest topics
Malware Simulators cannot test Antivirus Software
1 day, 12 hours ago |
malware.news
FBI warns of email spoofing by North Korean threat actor Kimsuky
1 day, 18 hours ago |
malware.news
You get a passkey, you get a passkey, everyone should get a passkey
1 day, 22 hours ago |
malware.news
Jobs in InfoSec / Cybersecurity
Information Assurance Security Specialist (IASS)
@ OBXtek Inc. | United States
Cyber Security Technology Analyst
@ Airbus | Bengaluru (Airbus)
Vice President, Cyber Operations Engineer
@ BlackRock | LO9-London - Drapers Gardens
Cryptography Software Developer
@ Intel | USA - AZ - Chandler
Lead Consultant, Geology
@ WSP | Richmond, VA, United States
BISO Cybersecurity Director
@ ABM Industries | Alpharetta, GA, United States