Search criteria

10 vulnerabilities found for Hitachi Virtual Storage Platform by Hitachi, Ltd

JVNDB-2026-009409

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009409",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-1978",
    "@id": "CVE-2025-1978",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009406

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2026-20846 | GDI+ Denial of Service Vulnerability CVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability CVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability CVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability CVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability CVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability CVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21249 | Windows NTLM Spoofing Vulnerability CVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability CVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability CVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability CVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability CVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability CVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability CVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "CVE-2026-20846 | GDI+ Denial of Service Vulnerability\r\nCVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability\r\nCVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21249 | Windows NTLM Spoofing Vulnerability\r\nCVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability\r\nCVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability\r\nCVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability\r\nCVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability\r\nCVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability\r\nCVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability\r\nCVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability\r\nCVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009406",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20846",
      "@id": "CVE-2026-20846",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21222",
      "@id": "CVE-2026-21222",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21231",
      "@id": "CVE-2026-21231",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21234",
      "@id": "CVE-2026-21234",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21235",
      "@id": "CVE-2026-21235",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21236",
      "@id": "CVE-2026-21236",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21237",
      "@id": "CVE-2026-21237",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21238",
      "@id": "CVE-2026-21238",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21239",
      "@id": "CVE-2026-21239",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21240",
      "@id": "CVE-2026-21240",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21242",
      "@id": "CVE-2026-21242",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21244",
      "@id": "CVE-2026-21244",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21246",
      "@id": "CVE-2026-21246",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21247",
      "@id": "CVE-2026-21247",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21248",
      "@id": "CVE-2026-21248",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21249",
      "@id": "CVE-2026-21249",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21253",
      "@id": "CVE-2026-21253",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21255",
      "@id": "CVE-2026-21255",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21508",
      "@id": "CVE-2026-21508",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21510",
      "@id": "CVE-2026-21510",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21513",
      "@id": "CVE-2026-21513",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21519",
      "@id": "CVE-2026-21519",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21525",
      "@id": "CVE-2026-21525",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21533",
      "@id": "CVE-2026-21533",
      "@source": "CVE"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009411

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009411",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-2902",
    "@id": "CVE-2025-2902",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009410

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009410",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-0824",
    "@id": "CVE-2025-0824",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009412

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009412",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-2514",
    "@id": "CVE-2025-2514",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009408

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009408",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-9661",
    "@id": "CVE-2025-9661",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-004359

Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability CVE-2026-20804 | Windows Hello Tampering Vulnerability CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20812 | LDAP Tampering Vulnerability CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability CVE-2026-20834 | Windows Spoofing Vulnerability CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability CVE-2026-20852 | Windows Hello Tampering Vulnerability CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
References
CVE https://www.cve.org/CVERecord?id=CVE-2023-31096
CVE https://www.cve.org/CVERecord?id=CVE-2024-55414
CVE https://www.cve.org/CVERecord?id=CVE-2026-20804
CVE https://www.cve.org/CVERecord?id=CVE-2026-20805
CVE https://www.cve.org/CVERecord?id=CVE-2026-20809
CVE https://www.cve.org/CVERecord?id=CVE-2026-20810
CVE https://www.cve.org/CVERecord?id=CVE-2026-20812
CVE https://www.cve.org/CVERecord?id=CVE-2026-20814
CVE https://www.cve.org/CVERecord?id=CVE-2026-20816
CVE https://www.cve.org/CVERecord?id=CVE-2026-20817
CVE https://www.cve.org/CVERecord?id=CVE-2026-20820
CVE https://www.cve.org/CVERecord?id=CVE-2026-20821
CVE https://www.cve.org/CVERecord?id=CVE-2026-20822
CVE https://www.cve.org/CVERecord?id=CVE-2026-20823
CVE https://www.cve.org/CVERecord?id=CVE-2026-20824
CVE https://www.cve.org/CVERecord?id=CVE-2026-20825
CVE https://www.cve.org/CVERecord?id=CVE-2026-20826
CVE https://www.cve.org/CVERecord?id=CVE-2026-20827
CVE https://www.cve.org/CVERecord?id=CVE-2026-20828
CVE https://www.cve.org/CVERecord?id=CVE-2026-20829
CVE https://www.cve.org/CVERecord?id=CVE-2026-20831
CVE https://www.cve.org/CVERecord?id=CVE-2026-20832
CVE https://www.cve.org/CVERecord?id=CVE-2026-20834
CVE https://www.cve.org/CVERecord?id=CVE-2026-20836
CVE https://www.cve.org/CVERecord?id=CVE-2026-20837
CVE https://www.cve.org/CVERecord?id=CVE-2026-20839
CVE https://www.cve.org/CVERecord?id=CVE-2026-20840
CVE https://www.cve.org/CVERecord?id=CVE-2026-20842
CVE https://www.cve.org/CVERecord?id=CVE-2026-20843
CVE https://www.cve.org/CVERecord?id=CVE-2026-20844
CVE https://www.cve.org/CVERecord?id=CVE-2026-20847
CVE https://www.cve.org/CVERecord?id=CVE-2026-20848
CVE https://www.cve.org/CVERecord?id=CVE-2026-20849
CVE https://www.cve.org/CVERecord?id=CVE-2026-20852
CVE https://www.cve.org/CVERecord?id=CVE-2026-20853
CVE https://www.cve.org/CVERecord?id=CVE-2026-20856
CVE https://www.cve.org/CVERecord?id=CVE-2026-20857
CVE https://www.cve.org/CVERecord?id=CVE-2026-20858
CVE https://www.cve.org/CVERecord?id=CVE-2026-20860
CVE https://www.cve.org/CVERecord?id=CVE-2026-20861
CVE https://www.cve.org/CVERecord?id=CVE-2026-20862
CVE https://www.cve.org/CVERecord?id=CVE-2026-20864
CVE https://www.cve.org/CVERecord?id=CVE-2026-20865
CVE https://www.cve.org/CVERecord?id=CVE-2026-20866
CVE https://www.cve.org/CVERecord?id=CVE-2026-20867
CVE https://www.cve.org/CVERecord?id=CVE-2026-20868
CVE https://www.cve.org/CVERecord?id=CVE-2026-20869
CVE https://www.cve.org/CVERecord?id=CVE-2026-20871
CVE https://www.cve.org/CVERecord?id=CVE-2026-20872
CVE https://www.cve.org/CVERecord?id=CVE-2026-20873
CVE https://www.cve.org/CVERecord?id=CVE-2026-20874
CVE https://www.cve.org/CVERecord?id=CVE-2026-20875
CVE https://www.cve.org/CVERecord?id=CVE-2026-20877
CVE https://www.cve.org/CVERecord?id=CVE-2026-20918
CVE https://www.cve.org/CVERecord?id=CVE-2026-20919
CVE https://www.cve.org/CVERecord?id=CVE-2026-20921
CVE https://www.cve.org/CVERecord?id=CVE-2026-20922
CVE https://www.cve.org/CVERecord?id=CVE-2026-20923
CVE https://www.cve.org/CVERecord?id=CVE-2026-20924
CVE https://www.cve.org/CVERecord?id=CVE-2026-20925
CVE https://www.cve.org/CVERecord?id=CVE-2026-20926
CVE https://www.cve.org/CVERecord?id=CVE-2026-20927
CVE https://www.cve.org/CVERecord?id=CVE-2026-20929
CVE https://www.cve.org/CVERecord?id=CVE-2026-20931
CVE https://www.cve.org/CVERecord?id=CVE-2026-20932
CVE https://www.cve.org/CVERecord?id=CVE-2026-20934
CVE https://www.cve.org/CVERecord?id=CVE-2026-20936
CVE https://www.cve.org/CVERecord?id=CVE-2026-20937
CVE https://www.cve.org/CVERecord?id=CVE-2026-20939
CVE https://www.cve.org/CVERecord?id=CVE-2026-20940
CVE https://www.cve.org/CVERecord?id=CVE-2026-20962
CVE https://www.cve.org/CVERecord?id=CVE-2026-21265
Related document https://msrc.microsoft.com/update-guide/en-us
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "dc:date": "2026-02-20T18:35+09:00",
  "dcterms:issued": "2026-02-20T18:35+09:00",
  "dcterms:modified": "2026-02-20T18:35+09:00",
  "description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-004359",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
      "@id": "CVE-2023-31096",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
      "@id": "CVE-2024-55414",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
      "@id": "CVE-2026-20804",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
      "@id": "CVE-2026-20805",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
      "@id": "CVE-2026-20809",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
      "@id": "CVE-2026-20810",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
      "@id": "CVE-2026-20812",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
      "@id": "CVE-2026-20814",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
      "@id": "CVE-2026-20816",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
      "@id": "CVE-2026-20817",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
      "@id": "CVE-2026-20820",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
      "@id": "CVE-2026-20821",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
      "@id": "CVE-2026-20822",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
      "@id": "CVE-2026-20823",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
      "@id": "CVE-2026-20824",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
      "@id": "CVE-2026-20825",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
      "@id": "CVE-2026-20826",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
      "@id": "CVE-2026-20827",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
      "@id": "CVE-2026-20828",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
      "@id": "CVE-2026-20829",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
      "@id": "CVE-2026-20831",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
      "@id": "CVE-2026-20832",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
      "@id": "CVE-2026-20834",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
      "@id": "CVE-2026-20836",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
      "@id": "CVE-2026-20837",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
      "@id": "CVE-2026-20839",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
      "@id": "CVE-2026-20840",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
      "@id": "CVE-2026-20842",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
      "@id": "CVE-2026-20843",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
      "@id": "CVE-2026-20844",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
      "@id": "CVE-2026-20847",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
      "@id": "CVE-2026-20848",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
      "@id": "CVE-2026-20849",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
      "@id": "CVE-2026-20852",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
      "@id": "CVE-2026-20853",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
      "@id": "CVE-2026-20856",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
      "@id": "CVE-2026-20857",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
      "@id": "CVE-2026-20858",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
      "@id": "CVE-2026-20860",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
      "@id": "CVE-2026-20861",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
      "@id": "CVE-2026-20862",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
      "@id": "CVE-2026-20864",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
      "@id": "CVE-2026-20865",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
      "@id": "CVE-2026-20866",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
      "@id": "CVE-2026-20867",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
      "@id": "CVE-2026-20868",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
      "@id": "CVE-2026-20869",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
      "@id": "CVE-2026-20871",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
      "@id": "CVE-2026-20872",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
      "@id": "CVE-2026-20873",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
      "@id": "CVE-2026-20874",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
      "@id": "CVE-2026-20875",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
      "@id": "CVE-2026-20877",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
      "@id": "CVE-2026-20918",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
      "@id": "CVE-2026-20919",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
      "@id": "CVE-2026-20921",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
      "@id": "CVE-2026-20922",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
      "@id": "CVE-2026-20923",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
      "@id": "CVE-2026-20924",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
      "@id": "CVE-2026-20925",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
      "@id": "CVE-2026-20926",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
      "@id": "CVE-2026-20927",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
      "@id": "CVE-2026-20929",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
      "@id": "CVE-2026-20931",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
      "@id": "CVE-2026-20932",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
      "@id": "CVE-2026-20934",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
      "@id": "CVE-2026-20936",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
      "@id": "CVE-2026-20937",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
      "@id": "CVE-2026-20939",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
      "@id": "CVE-2026-20940",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
      "@id": "CVE-2026-20962",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
      "@id": "CVE-2026-21265",
      "@source": "CVE"
    },
    {
      "#text": "https://msrc.microsoft.com/update-guide/en-us",
      "@id": "https://msrc.microsoft.com/update-guide/en-us",
      "@source": "Related document"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-001582

Vulnerability from jvndb - Published: 2026-01-21 12:11 - Updated:2026-01-21 12:11
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
References
CVE https://www.cve.org/CVERecord?id=CVE-2025-54100
CVE https://www.cve.org/CVERecord?id=CVE-2025-55233
CVE https://www.cve.org/CVERecord?id=CVE-2025-59516
CVE https://www.cve.org/CVERecord?id=CVE-2025-59517
CVE https://www.cve.org/CVERecord?id=CVE-2025-62221
CVE https://www.cve.org/CVERecord?id=CVE-2025-62454
CVE https://www.cve.org/CVERecord?id=CVE-2025-62455
CVE https://www.cve.org/CVERecord?id=CVE-2025-62457
CVE https://www.cve.org/CVERecord?id=CVE-2025-62458
CVE https://www.cve.org/CVERecord?id=CVE-2025-62461
CVE https://www.cve.org/CVERecord?id=CVE-2025-62462
CVE https://www.cve.org/CVERecord?id=CVE-2025-62463
CVE https://www.cve.org/CVERecord?id=CVE-2025-62464
CVE https://www.cve.org/CVERecord?id=CVE-2025-62466
CVE https://www.cve.org/CVERecord?id=CVE-2025-62467
CVE https://www.cve.org/CVERecord?id=CVE-2025-62470
CVE https://www.cve.org/CVERecord?id=CVE-2025-62472
CVE https://www.cve.org/CVERecord?id=CVE-2025-62473
CVE https://www.cve.org/CVERecord?id=CVE-2025-62474
CVE https://www.cve.org/CVERecord?id=CVE-2025-62549
CVE https://www.cve.org/CVERecord?id=CVE-2025-62565
CVE https://www.cve.org/CVERecord?id=CVE-2025-62567
CVE https://www.cve.org/CVERecord?id=CVE-2025-62571
CVE https://www.cve.org/CVERecord?id=CVE-2025-62573
CVE https://www.cve.org/CVERecord?id=CVE-2025-64658
CVE https://www.cve.org/CVERecord?id=CVE-2025-64661
CVE https://www.cve.org/CVERecord?id=CVE-2025-64670
CVE https://www.cve.org/CVERecord?id=CVE-2025-64673
Related document https://portal.msrc.microsoft.com/en-US/security-guidance
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
  "dc:date": "2026-01-21T12:11+09:00",
  "dcterms:issued": "2026-01-21T12:11+09:00",
  "dcterms:modified": "2026-01-21T12:11+09:00",
  "description": "CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability\r\nCVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability\r\nCVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62458 | Win32k Elevation of Privilege Vulnerability\r\nCVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability\r\nCVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability\r\nCVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability\r\nCVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability\r\nCVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability\r\nCVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability\r\nCVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-001582",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-54100",
      "@id": "CVE-2025-54100",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-55233",
      "@id": "CVE-2025-55233",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-59516",
      "@id": "CVE-2025-59516",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-59517",
      "@id": "CVE-2025-59517",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62221",
      "@id": "CVE-2025-62221",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62454",
      "@id": "CVE-2025-62454",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62455",
      "@id": "CVE-2025-62455",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62457",
      "@id": "CVE-2025-62457",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62458",
      "@id": "CVE-2025-62458",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62461",
      "@id": "CVE-2025-62461",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62462",
      "@id": "CVE-2025-62462",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62463",
      "@id": "CVE-2025-62463",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62464",
      "@id": "CVE-2025-62464",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62466",
      "@id": "CVE-2025-62466",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62467",
      "@id": "CVE-2025-62467",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62470",
      "@id": "CVE-2025-62470",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62472",
      "@id": "CVE-2025-62472",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62473",
      "@id": "CVE-2025-62473",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62474",
      "@id": "CVE-2025-62474",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62549",
      "@id": "CVE-2025-62549",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62565",
      "@id": "CVE-2025-62565",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62567",
      "@id": "CVE-2025-62567",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62571",
      "@id": "CVE-2025-62571",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62573",
      "@id": "CVE-2025-62573",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64658",
      "@id": "CVE-2025-64658",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64661",
      "@id": "CVE-2025-64661",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64670",
      "@id": "CVE-2025-64670",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64673",
      "@id": "CVE-2025-64673",
      "@source": "CVE"
    },
    {
      "#text": "https://portal.msrc.microsoft.com/en-US/security-guidance",
      "@id": "https://portal.msrc.microsoft.com/en-US/security-guidance",
      "@source": "Related document"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2024-003026

Vulnerability from jvndb - Published: 2024-03-27 15:52 - Updated:2024-03-27 15:52
Summary
Security information for Hitachi Disk Array Systems
Details
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
  "dc:date": "2024-03-27T15:52+09:00",
  "dcterms:issued": "2024-03-27T15:52+09:00",
  "dcterms:modified": "2024-03-27T15:52+09:00",
  "description": "Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.",
  "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:hitachi:unified_storage",
      "@product": "Hitachi Unified Storage",
      "@vendor": "Hitachi, Ltd",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:hitachi:virtual_storage_platform",
      "@product": "Hitachi Virtual Storage Platform",
      "@vendor": "Hitachi, Ltd",
      "@version": "2.2"
    }
  ],
  "sec:identifier": "JVNDB-2024-003026",
  "sec:references": [
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407",
      "@id": "CVE-2022-36407",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2020-001545

Vulnerability from jvndb - Published: 2020-02-14 15:34 - Updated:2020-02-14 15:34
Summary
Security information for Hitachi Disk Array Systems
Details
A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.
References
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
  "dc:date": "2020-02-14T15:34+09:00",
  "dcterms:issued": "2020-02-14T15:34+09:00",
  "dcterms:modified": "2020-02-14T15:34+09:00",
  "description": "A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.",
  "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2020-001545",
  "sec:references": {
    "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
    "@id": "CWE-noinfo",
    "@title": "No Mapping(CWE-noinfo)"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}