FAQ
What privileges could be gained by an attacker who successfully exploited this vulnerability? An attacker who successfully exploited this vulnerability could gain SYSTEM privileges.
Improper input validation in System Center Operations Manager allows an authorized attacker to elevate privileges over a network.