Search criteria
10 vulnerabilities found for Hitachi Virtual Storage Platform by Hitachi, Ltd
JVNDB-2026-009409
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009409",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-1978",
"@id": "CVE-2025-1978",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009406
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2026-20846 | GDI+ Denial of Service Vulnerability
CVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability
CVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21249 | Windows NTLM Spoofing Vulnerability
CVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability
CVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability
CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability
CVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability
CVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability
CVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "CVE-2026-20846 | GDI+ Denial of Service Vulnerability\r\nCVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability\r\nCVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21249 | Windows NTLM Spoofing Vulnerability\r\nCVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability\r\nCVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability\r\nCVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability\r\nCVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability\r\nCVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability\r\nCVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability\r\nCVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability\r\nCVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009406",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20846",
"@id": "CVE-2026-20846",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21222",
"@id": "CVE-2026-21222",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21231",
"@id": "CVE-2026-21231",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21234",
"@id": "CVE-2026-21234",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21235",
"@id": "CVE-2026-21235",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21236",
"@id": "CVE-2026-21236",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21237",
"@id": "CVE-2026-21237",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21238",
"@id": "CVE-2026-21238",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21239",
"@id": "CVE-2026-21239",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21240",
"@id": "CVE-2026-21240",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21242",
"@id": "CVE-2026-21242",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21244",
"@id": "CVE-2026-21244",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21246",
"@id": "CVE-2026-21246",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21247",
"@id": "CVE-2026-21247",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21248",
"@id": "CVE-2026-21248",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21249",
"@id": "CVE-2026-21249",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21253",
"@id": "CVE-2026-21253",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21255",
"@id": "CVE-2026-21255",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21508",
"@id": "CVE-2026-21508",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21510",
"@id": "CVE-2026-21510",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21513",
"@id": "CVE-2026-21513",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21519",
"@id": "CVE-2026-21519",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21525",
"@id": "CVE-2026-21525",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21533",
"@id": "CVE-2026-21533",
"@source": "CVE"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009411
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009411",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-2902",
"@id": "CVE-2025-2902",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009410
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009410",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-0824",
"@id": "CVE-2025-0824",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009412
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009412",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-2514",
"@id": "CVE-2025-2514",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009408
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009408",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-9661",
"@id": "CVE-2025-9661",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-004359
Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2026-20804 | Windows Hello Tampering Vulnerability
CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability
CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability
CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20812 | LDAP Tampering Vulnerability
CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20834 | Windows Spoofing Vulnerability
CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability
CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20852 | Windows Hello Tampering Vulnerability
CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability
CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability
CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability
CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
References
| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"dc:date": "2026-02-20T18:35+09:00",
"dcterms:issued": "2026-02-20T18:35+09:00",
"dcterms:modified": "2026-02-20T18:35+09:00",
"description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-004359",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
"@id": "CVE-2023-31096",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
"@id": "CVE-2024-55414",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
"@id": "CVE-2026-20804",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
"@id": "CVE-2026-20805",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
"@id": "CVE-2026-20809",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
"@id": "CVE-2026-20810",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
"@id": "CVE-2026-20812",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
"@id": "CVE-2026-20814",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
"@id": "CVE-2026-20816",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
"@id": "CVE-2026-20817",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
"@id": "CVE-2026-20820",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
"@id": "CVE-2026-20821",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
"@id": "CVE-2026-20822",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
"@id": "CVE-2026-20823",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
"@id": "CVE-2026-20824",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
"@id": "CVE-2026-20825",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
"@id": "CVE-2026-20826",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
"@id": "CVE-2026-20827",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
"@id": "CVE-2026-20828",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
"@id": "CVE-2026-20829",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
"@id": "CVE-2026-20831",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
"@id": "CVE-2026-20832",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
"@id": "CVE-2026-20834",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
"@id": "CVE-2026-20836",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
"@id": "CVE-2026-20837",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
"@id": "CVE-2026-20839",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
"@id": "CVE-2026-20840",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
"@id": "CVE-2026-20842",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
"@id": "CVE-2026-20843",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
"@id": "CVE-2026-20844",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
"@id": "CVE-2026-20847",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
"@id": "CVE-2026-20848",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
"@id": "CVE-2026-20849",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
"@id": "CVE-2026-20852",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
"@id": "CVE-2026-20853",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
"@id": "CVE-2026-20856",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
"@id": "CVE-2026-20857",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
"@id": "CVE-2026-20858",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
"@id": "CVE-2026-20860",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
"@id": "CVE-2026-20861",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
"@id": "CVE-2026-20862",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
"@id": "CVE-2026-20864",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
"@id": "CVE-2026-20865",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
"@id": "CVE-2026-20866",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
"@id": "CVE-2026-20867",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
"@id": "CVE-2026-20868",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
"@id": "CVE-2026-20869",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
"@id": "CVE-2026-20871",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
"@id": "CVE-2026-20872",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
"@id": "CVE-2026-20873",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
"@id": "CVE-2026-20874",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
"@id": "CVE-2026-20875",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
"@id": "CVE-2026-20877",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
"@id": "CVE-2026-20918",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
"@id": "CVE-2026-20919",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
"@id": "CVE-2026-20921",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
"@id": "CVE-2026-20922",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
"@id": "CVE-2026-20923",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
"@id": "CVE-2026-20924",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
"@id": "CVE-2026-20925",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
"@id": "CVE-2026-20926",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
"@id": "CVE-2026-20927",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
"@id": "CVE-2026-20929",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
"@id": "CVE-2026-20931",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
"@id": "CVE-2026-20932",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
"@id": "CVE-2026-20934",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
"@id": "CVE-2026-20936",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
"@id": "CVE-2026-20937",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
"@id": "CVE-2026-20939",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
"@id": "CVE-2026-20940",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
"@id": "CVE-2026-20962",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
"@id": "CVE-2026-21265",
"@source": "CVE"
},
{
"#text": "https://msrc.microsoft.com/update-guide/en-us",
"@id": "https://msrc.microsoft.com/update-guide/en-us",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-001582
Vulnerability from jvndb - Published: 2026-01-21 12:11 - Updated:2026-01-21 12:11Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability
CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability
CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability
CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability
CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability
CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability
CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
References
| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"dc:date": "2026-01-21T12:11+09:00",
"dcterms:issued": "2026-01-21T12:11+09:00",
"dcterms:modified": "2026-01-21T12:11+09:00",
"description": "CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability\r\nCVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability\r\nCVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62458 | Win32k Elevation of Privilege Vulnerability\r\nCVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability\r\nCVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability\r\nCVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability\r\nCVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability\r\nCVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability\r\nCVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability\r\nCVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-001582",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-54100",
"@id": "CVE-2025-54100",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-55233",
"@id": "CVE-2025-55233",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59516",
"@id": "CVE-2025-59516",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59517",
"@id": "CVE-2025-59517",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62221",
"@id": "CVE-2025-62221",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62454",
"@id": "CVE-2025-62454",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62455",
"@id": "CVE-2025-62455",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62457",
"@id": "CVE-2025-62457",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62458",
"@id": "CVE-2025-62458",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62461",
"@id": "CVE-2025-62461",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62462",
"@id": "CVE-2025-62462",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62463",
"@id": "CVE-2025-62463",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62464",
"@id": "CVE-2025-62464",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62466",
"@id": "CVE-2025-62466",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62467",
"@id": "CVE-2025-62467",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62470",
"@id": "CVE-2025-62470",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62472",
"@id": "CVE-2025-62472",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62473",
"@id": "CVE-2025-62473",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62474",
"@id": "CVE-2025-62474",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62549",
"@id": "CVE-2025-62549",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62565",
"@id": "CVE-2025-62565",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62567",
"@id": "CVE-2025-62567",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62571",
"@id": "CVE-2025-62571",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62573",
"@id": "CVE-2025-62573",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64658",
"@id": "CVE-2025-64658",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64661",
"@id": "CVE-2025-64661",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64670",
"@id": "CVE-2025-64670",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64673",
"@id": "CVE-2025-64673",
"@source": "CVE"
},
{
"#text": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@id": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2024-003026
Vulnerability from jvndb - Published: 2024-03-27 15:52 - Updated:2024-03-27 15:52Summary
Security information for Hitachi Disk Array Systems
Details
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"dc:date": "2024-03-27T15:52+09:00",
"dcterms:issued": "2024-03-27T15:52+09:00",
"dcterms:modified": "2024-03-27T15:52+09:00",
"description": "Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"sec:cpe": [
{
"#text": "cpe:/h:hitachi:unified_storage",
"@product": "Hitachi Unified Storage",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:identifier": "JVNDB-2024-003026",
"sec:references": [
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407",
"@id": "CVE-2022-36407",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2020-001545
Vulnerability from jvndb - Published: 2020-02-14 15:34 - Updated:2020-02-14 15:34Summary
Security information for Hitachi Disk Array Systems
Details
A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"dc:date": "2020-02-14T15:34+09:00",
"dcterms:issued": "2020-02-14T15:34+09:00",
"dcterms:modified": "2020-02-14T15:34+09:00",
"description": "A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.",
"link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2020-001545",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Security information for Hitachi Disk Array Systems"
}