Event

TGIT
1/8

Video

IBM
2/8

Quiz

Quiz
3/8

Award

cnapp-v3
4/8

eBook

cnapp-v3
5/8

What's New?

AI icon

Don't just use AI,
Secure AI with AccuKnox AI-SPM!

PRODUCT TOUR
6/8

Blog

mssp

Why is AccuKnox the most MSSP ready CNAPP?

LEARN MORE
7/8

Comparison

Comparison

Searching for Alternative CNAPP?

COMPARE NOW
8/8
omigod

OMIGOD – Critical OMI Vulnerabilities Affecting Azure Customers

 |  Edited : November 18, 2025

OMIGOD Among Google cloud, IBM, and AWS,  Microsoft Azure was cited as the most trusted public cloud. The Covid-19 pandemic has accelerated the adoption of cloud computing with multiple companies migrating to the cloud providers, especially Microsoft’s Azure, cites this new research. OMI doesn’t come with VMs, but we are installing them on top of the […]

Reading Time: 6 minutes

TL;DR

  • OMIGOD exposed millions of Azure Linux VMs to unauthenticated remote code execution through vulnerable OMI agents used for monitoring and management.
  • Attackers could exploit these flaws to gain root privileges, execute arbitrary commands, and move laterally within affected Azure environments undetected.
  • All Azure Linux VMs running OMI versions below 1.6.8.1, including systems with Log Analytics or Configuration Management extensions, were vulnerable.
  • Check your VMs using dpkg -l | grep omi, rpm -qa | grep omi, or Microsoft’s omi_check.sh detection script to confirm safety.
  • Upgrade to OMI version 1.6.8.1 or later, restart OMI services, and monitor for abnormal processes or network connections post-patch.

OMIGOD

Among Google cloud, IBM, and AWS,  Microsoft Azure was cited as the most trusted public cloud. The Covid-19 pandemic has accelerated the adoption of cloud computing with multiple companies migrating to the cloud providers, especially Microsoft’s Azure, cites this new research.

OMI doesn’t come with VMs, but we are installing them on top of the virtual machine. Most of the users use these convenient purposes. Recently, azure has been affected by four critical vulnerabilities in OMI. Which is one of Azure’s almost every yet least known software agent and is deployed on a vast portion of Linux VMs in Azure.

These are the CVE details for OMI critical vulnerabilities, which are very easy to exploit, and the attacker will launch an attack within the network by remotely executing an arbitrary code with a single request, and he will gain the root privileges.

What is OMI?

Open Management Infrastructure (OMI) is an open-source Web-Based Enterprise Management (WBEM) implementation for managing Linux and UNIX systems. Several Azure Virtual Machine (VM) management extensions use this framework to orchestrate configuration management and log collection on Linux VMs.

The remote code execution vulnerability only impacts customers using a Linux management solution (on-premises System Center Operations Manager (SCOM or Azure Automation State Configuration or Azure Desired State Configuration extension) that enables remote OMI management.

OMI is an agent which is automatically deployed on azure VMs as a segment in the onboarding process, which allows the users to handle the configurations across remote and local environments and collect statistics.

OMI is UNIX/Linux, similar to Windows WMI. OMI agents are normally used on-premises for the management of Linux machines. OMI is set up into Microsoft System Center for Linux, Microsoft’s server management solution.

Who is Vulnerable

Most massive organizations using Azure are affected.  First and foremost, any customer using one or more of the following services:

  • Azure Automation
  • Azure Automatic Update
  • Azure Operation Management Suite
  • Azure Log Analytics
  • Azure Configuration Management
  • Azure Diagnostics

Note: these are some partial lists.

What versions of OMI are vulnerable?

All OMI versions below v1.6.8-1 are vulnerable.

How to identify your virtual machine with open management infrastructure (OMI)

Identify your VMs with OMI agents

The first step is to gather a list of all of your Azure VMs that have the OMI agent installed on them.

1. Connect to your Azure VMs and run in the terminal:

a. For Debian systems (e.g., Ubuntu): dpkg-I omi

omigod

b. For Redhat-based systems (e.g., Fedora, CentOS, RHEL): rpm-qa omi

omigod

If OMI isn’t installed, no results will return, and your machine isn’t vulnerable to OMIGOD.

2. If results return, you’ll be able to see what the installed OMI version on your machines is. Version 1.6.8.1 is the patched version.

How can we mitigate an OMI attack?

To mitigate this vulnerability Microsoft is providing the tool to check whether your VMs are vulnerable or not to this attack. To perform this download the following GitHub URL https://github.com/microsoft/OMS-Agent-for-Linux in cloud shell. (This tool detects vulnerable OMI installations (< 1.6.8.1) in your subscriptions). SSH into VMs in the cloud shell.

Solutions for Cloud

Automatic: On September 17, 2021, Microsoft announced an auto-update feature for OMI agents installed as part of Azure cloud services. According to the announcement, the auto-update process should be completed by September 22, 2021.

Manual Update

Change the directory
cd OMS-Agent-for-Linux/tools/OMIcheck/

To check for Vulnerability

sh omi_check.sh

iff you don’t get any output, it means you don’t have omi installed in your VMs. If you have installed it, it will show the version number of omi. The patched version of OMI is 1.6.8.1.sh omi_upgrade.sh
If OMI is not installed in your VM, it will install automatically but if you have a running vulnerable version, it will automatically upgrade to the latest stable version.

omigod azure customers 3

On-premise Solutions:

Microsoft provides on-premises installations, along with specific additional products, that still require manual updating of the OMI package.

For more information on how to protect against OMIGOD vulnerability, do refer to this blog:

Additional Guidance Regarding OMI Vulnerabilities within Azure VM Management Extensions

FAQs:

What is OMIGOD, briefly?

OMIGOD refers to a cluster of critical vulnerabilities in Open Management Infrastructure, or OMI, used by Azure VM management extensions. These flaws enabled remote code execution and privilege escalation on Linux VMs that had vulnerable OMI versions installed, often via Azure management extensions handling logs and configuration.

Which CVEs are involved, and how severe are they?

Key CVEs include CVE-2021-38647 (unauthenticated RCE) and CVE-2021-38645, CVE-2021-38648, CVE-2021-38649 (privilege escalations). They were assigned high CVSS scores and warrant immediate patching. Always cross-check CVSS values on Microsofts MSRC advisories before reporting.

How do I quickly detect if my VM has vulnerable OMI?

SSH to the VM and run dpkg -l | grep omi on Debian/Ubuntu systems or rpm -qa | grep omi on RHEL/CentOS. Use Microsofts OMS-Agent-for-Linux omi_check.sh for subscription-wide checks. If output shows versions < 1.6.8.1, treat the host as vulnerable.

What is the recommended remediation procedure?

For Azure-managed agents, Microsoft enabled auto-update; confirm patch status and run the OMS-Agent update scripts: clone OMS-Agent-for-Linux, run tools/OMIcheck/omi_check.sh, then omi_upgrade.sh as needed. For on-prem or manual installs, use package managers to install OMI 1.6.8.1 or later, snapshot before changes, and verify service restart.

How do I verify the patch applied successfully?

After upgrade, re-run omi_check.sh, ensure omi package version is 1.6.8.1 or greater with dpkg -l or rpm -qa, confirm OMI services are running, and check logs for reboots or failures. Monitor for unusual activity in syslog and Azure diagnostics for 24–72 hours post-patch.

Conclusion

Now you can protect your workloads in minutes using AccuKnox, it is available to protect your Kubernetes and other cloud workloads using Kernel Native Primitives such as AppArmor, SELinux, and eBPF.

Let us know if you are seeking additional guidance in planning your cloud security program.

Ready for a personalized security assessment?

“Choosing AccuKnox was driven by opensource KubeArmor’s novel use of eBPF and LSM technologies, delivering runtime security”

idt

Golan Ben-Oni

Chief Information Officer

“At Prudent, we advocate for a comprehensive end-to-end methodology in application and cloud security. AccuKnox excelled in all areas in our in depth evaluation.”

prudent

Manoj Kern

CIO

“Tible is committed to delivering comprehensive security, compliance, and governance for all of its stakeholders.”

tible

Merijn Boom

Managing Director