Search criteria
3 vulnerabilities found for Hitachi Virtual Storage Platform by Hitachi, Ltd
JVNDB-2026-001582
Vulnerability from jvndb - Published: 2026-01-21 12:11 - Updated:2026-01-21 12:11Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability
CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability
CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability
CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability
CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability
CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability
CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"dc:date": "2026-01-21T12:11+09:00",
"dcterms:issued": "2026-01-21T12:11+09:00",
"dcterms:modified": "2026-01-21T12:11+09:00",
"description": "CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability\r\nCVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability\r\nCVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62458 | Win32k Elevation of Privilege Vulnerability\r\nCVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability\r\nCVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability\r\nCVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability\r\nCVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability\r\nCVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability\r\nCVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability\r\nCVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-001582",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-54100",
"@id": "CVE-2025-54100",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-55233",
"@id": "CVE-2025-55233",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59516",
"@id": "CVE-2025-59516",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59517",
"@id": "CVE-2025-59517",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62221",
"@id": "CVE-2025-62221",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62454",
"@id": "CVE-2025-62454",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62455",
"@id": "CVE-2025-62455",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62457",
"@id": "CVE-2025-62457",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62458",
"@id": "CVE-2025-62458",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62461",
"@id": "CVE-2025-62461",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62462",
"@id": "CVE-2025-62462",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62463",
"@id": "CVE-2025-62463",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62464",
"@id": "CVE-2025-62464",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62466",
"@id": "CVE-2025-62466",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62467",
"@id": "CVE-2025-62467",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62470",
"@id": "CVE-2025-62470",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62472",
"@id": "CVE-2025-62472",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62473",
"@id": "CVE-2025-62473",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62474",
"@id": "CVE-2025-62474",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62549",
"@id": "CVE-2025-62549",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62565",
"@id": "CVE-2025-62565",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62567",
"@id": "CVE-2025-62567",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62571",
"@id": "CVE-2025-62571",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62573",
"@id": "CVE-2025-62573",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64658",
"@id": "CVE-2025-64658",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64661",
"@id": "CVE-2025-64661",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64670",
"@id": "CVE-2025-64670",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64673",
"@id": "CVE-2025-64673",
"@source": "CVE"
},
{
"#text": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@id": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2024-003026
Vulnerability from jvndb - Published: 2024-03-27 15:52 - Updated:2024-03-27 15:52Summary
Security information for Hitachi Disk Array Systems
Details
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"dc:date": "2024-03-27T15:52+09:00",
"dcterms:issued": "2024-03-27T15:52+09:00",
"dcterms:modified": "2024-03-27T15:52+09:00",
"description": "Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"sec:cpe": [
{
"#text": "cpe:/h:hitachi:unified_storage",
"@product": "Hitachi Unified Storage",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:identifier": "JVNDB-2024-003026",
"sec:references": [
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407",
"@id": "CVE-2022-36407",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2020-001545
Vulnerability from jvndb - Published: 2020-02-14 15:34 - Updated:2020-02-14 15:34Summary
Security information for Hitachi Disk Array Systems
Details
A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"dc:date": "2020-02-14T15:34+09:00",
"dcterms:issued": "2020-02-14T15:34+09:00",
"dcterms:modified": "2020-02-14T15:34+09:00",
"description": "A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.",
"link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2020-001545",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Security information for Hitachi Disk Array Systems"
}