SCCM: The Tree That Always Bears Bad Fruits
This talk demonstrates multiple SQL injection vulnerabilities and authentication bypass techniques within Microsoft Configuration Manager (SCCM). The research focuses on the SMS Provider and CcmMessaging services, which are critical components for endpoint management and code execution. The speaker provides a methodology for identifying these vulnerabilities through reverse engineering and string analysis, and releases custom tools to automate exploitation and persistence. The presentation concludes with a demonstration of how these flaws can be leveraged for full site takeover.
Exploiting Microsoft Configuration Manager: From Unauthenticated SQL Injection to Full Site Takeover
TLDR: Recent research into Microsoft Configuration Manager (SCCM) reveals critical vulnerabilities, including unauthenticated SQL injection in the SMS Provider and CcmMessaging services. These flaws allow attackers to bypass authentication and achieve full site takeover by manipulating database queries. Security professionals should immediately audit their SCCM environments for these patterns and apply the latest vendor patches to mitigate the risk of unauthorized code execution.
Microsoft Configuration Manager, formerly known as SCCM, remains a cornerstone of enterprise endpoint management. Because it manages thousands of devices with high-level privileges, it is a high-value target for any red team engagement. If you can compromise the SCCM server, you effectively own the entire fleet. Recent research presented at DEF CON 33 highlights how deep-seated architectural choices in SCCM services create a massive attack surface for unauthenticated attackers.
The Anatomy of the Vulnerability
The core of the issue lies in how SCCM handles internal communications and database interactions. The SMS Provider and CcmMessaging services act as the bridge between client agents and the backend SQL database. These services often rely on WMI and COM for internal communication, which can be complex to audit. By performing deep reverse engineering on these components, researchers identified that several endpoints were exposed without proper authentication checks.
Specifically, the MP_LocationManager handler within the CcmMessaging service was found to be vulnerable to unauthenticated SQL injection. Because the service was configured with Visibility = All, it did not require any device identity proof. An attacker can send a crafted request to this endpoint to execute arbitrary SQL commands. Since the SCCM site server typically runs with sysadmin privileges on the backend database, this injection point is a direct path to full site takeover.
Technical Execution and Tooling
Exploiting these vulnerabilities requires a solid understanding of the SCCM communication protocol. The research team released a suite of tools to automate the discovery and exploitation of these flaws. The sccm-sql-client is particularly useful for pentesters, as it provides pre-built queries to map the SCCM topology and extract sensitive credentials.
To trigger the SQL injection, you need to target the SourceID field in the header of a CcmMessaging request. The following command demonstrates how an attacker might interact with the service to pull policies without valid credentials:
python3 sccmsecrets.py policies -mp https://cmc.corp.local -n FakeClientBypassApproval -rs 3
Once you have established a foothold, you can use the CcmMessagingBackdoor to maintain persistence. This tool allows you to register a rogue COM object that implements the IccmEndpoint::Execute method. By registering this object, you can receive PowerShell commands from the management point and return the output, effectively turning the SCCM infrastructure into a command-and-control channel.
Real-World Engagement Strategy
During a penetration test, your primary goal should be to identify the SCCM site server and determine its patch level. If you find an unpatched instance, you can use the sccm_servers command in the sccm-sql-client tool to map the hierarchy. If you encounter a multi-site environment, you can often relay authentication from one management point to another, even if the target management point has the SMS Provider role.
The impact of these vulnerabilities is severe. Because SCCM agents run as SYSTEM on managed endpoints, an attacker who gains control of the site server can push malicious scripts to every machine in the organization. This is not just a privilege escalation; it is a total compromise of the managed environment. Even if you only have read-only access to the SCCM database, you can often leverage that access to escalate your privileges by manipulating the SC_UserAccount table or other configuration settings.
Defensive Considerations
Defending against these attacks requires a layered approach. First, ensure that your SCCM environment is fully patched. Microsoft has released specific updates to address these issues, such as those detailed in the advisory for CVE-2024-43468 and CVE-2025-47178. These patches introduce prepared statements to prevent SQL injection, though as the research shows, the underlying logic can sometimes be bypassed if the environment is misconfigured.
Beyond patching, you should restrict access to the management point endpoints. Ensure that mutual TLS is enforced for all client-to-server communications, as this prevents unauthenticated requests from reaching the vulnerable handlers. Monitor your SCCM logs for unusual activity, particularly requests to the MP_LocationManager or the creation of unexpected WMI objects. If you are a defender, treat your SCCM server with the same level of security as your domain controllers.
The complexity of SCCM makes it a difficult target to secure, but the payoff for attackers is too high to ignore. As researchers continue to find new ways to abuse these management services, the focus must shift toward stricter access controls and continuous monitoring of the communication channels between agents and the site server. If you are currently testing an environment that relies on SCCM, start by auditing the SMS Provider configuration and verifying that your site server is not exposed to unauthenticated traffic. The tools are out there, and the path to site takeover is well-documented.
Vulnerability Classes
Target Technologies
Attack Techniques
All Tags
Up Next From This Conference

DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks

Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen

Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
Similar Talks

Inside the FBI's Secret Encrypted Phone Company 'Anom'

Kill List: Hacking an Assassination Site on the Dark Web

