Search criteria
ⓘ
Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.
10 vulnerabilities found for Hitachi Virtual Storage Platform by Hitachi, Ltd
JVNDB-2026-009406
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2026-20846 | GDI+ Denial of Service Vulnerability
CVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability
CVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability
CVE-2026-21249 | Windows NTLM Spoofing Vulnerability
CVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability
CVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability
CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability
CVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability
CVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability
CVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability
CVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability
References
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "CVE-2026-20846 | GDI+ Denial of Service Vulnerability\r\nCVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability\r\nCVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21249 | Windows NTLM Spoofing Vulnerability\r\nCVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability\r\nCVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability\r\nCVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability\r\nCVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability\r\nCVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability\r\nCVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability\r\nCVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability\r\nCVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009406",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20846",
"@id": "CVE-2026-20846",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21222",
"@id": "CVE-2026-21222",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21231",
"@id": "CVE-2026-21231",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21234",
"@id": "CVE-2026-21234",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21235",
"@id": "CVE-2026-21235",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21236",
"@id": "CVE-2026-21236",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21237",
"@id": "CVE-2026-21237",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21238",
"@id": "CVE-2026-21238",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21239",
"@id": "CVE-2026-21239",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21240",
"@id": "CVE-2026-21240",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21242",
"@id": "CVE-2026-21242",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21244",
"@id": "CVE-2026-21244",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21246",
"@id": "CVE-2026-21246",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21247",
"@id": "CVE-2026-21247",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21248",
"@id": "CVE-2026-21248",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21249",
"@id": "CVE-2026-21249",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21253",
"@id": "CVE-2026-21253",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21255",
"@id": "CVE-2026-21255",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21508",
"@id": "CVE-2026-21508",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21510",
"@id": "CVE-2026-21510",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21513",
"@id": "CVE-2026-21513",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21519",
"@id": "CVE-2026-21519",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21525",
"@id": "CVE-2026-21525",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21533",
"@id": "CVE-2026-21533",
"@source": "CVE"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009409
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009409",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-1978",
"@id": "CVE-2025-1978",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009408
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009408",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-9661",
"@id": "CVE-2025-9661",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009411
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009411",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-2902",
"@id": "CVE-2025-2902",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009412
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009412",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-2514",
"@id": "CVE-2025-2514",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-009410
Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824
References
| Type | URL | |
|---|---|---|
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
"dc:date": "2026-03-31T15:53+09:00",
"dcterms:issued": "2026-03-31T15:53+09:00",
"dcterms:modified": "2026-03-31T15:53+09:00",
"description": "A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-009410",
"sec:references": {
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-0824",
"@id": "CVE-2025-0824",
"@source": "CVE"
},
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-004359
Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2026-20804 | Windows Hello Tampering Vulnerability
CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability
CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability
CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20812 | LDAP Tampering Vulnerability
CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20834 | Windows Spoofing Vulnerability
CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability
CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20852 | Windows Hello Tampering Vulnerability
CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability
CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability
CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability
CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
References
| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"dc:date": "2026-02-20T18:35+09:00",
"dcterms:issued": "2026-02-20T18:35+09:00",
"dcterms:modified": "2026-02-20T18:35+09:00",
"description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-004359",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
"@id": "CVE-2023-31096",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
"@id": "CVE-2024-55414",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
"@id": "CVE-2026-20804",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
"@id": "CVE-2026-20805",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
"@id": "CVE-2026-20809",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
"@id": "CVE-2026-20810",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
"@id": "CVE-2026-20812",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
"@id": "CVE-2026-20814",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
"@id": "CVE-2026-20816",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
"@id": "CVE-2026-20817",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
"@id": "CVE-2026-20820",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
"@id": "CVE-2026-20821",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
"@id": "CVE-2026-20822",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
"@id": "CVE-2026-20823",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
"@id": "CVE-2026-20824",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
"@id": "CVE-2026-20825",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
"@id": "CVE-2026-20826",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
"@id": "CVE-2026-20827",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
"@id": "CVE-2026-20828",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
"@id": "CVE-2026-20829",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
"@id": "CVE-2026-20831",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
"@id": "CVE-2026-20832",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
"@id": "CVE-2026-20834",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
"@id": "CVE-2026-20836",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
"@id": "CVE-2026-20837",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
"@id": "CVE-2026-20839",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
"@id": "CVE-2026-20840",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
"@id": "CVE-2026-20842",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
"@id": "CVE-2026-20843",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
"@id": "CVE-2026-20844",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
"@id": "CVE-2026-20847",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
"@id": "CVE-2026-20848",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
"@id": "CVE-2026-20849",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
"@id": "CVE-2026-20852",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
"@id": "CVE-2026-20853",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
"@id": "CVE-2026-20856",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
"@id": "CVE-2026-20857",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
"@id": "CVE-2026-20858",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
"@id": "CVE-2026-20860",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
"@id": "CVE-2026-20861",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
"@id": "CVE-2026-20862",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
"@id": "CVE-2026-20864",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
"@id": "CVE-2026-20865",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
"@id": "CVE-2026-20866",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
"@id": "CVE-2026-20867",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
"@id": "CVE-2026-20868",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
"@id": "CVE-2026-20869",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
"@id": "CVE-2026-20871",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
"@id": "CVE-2026-20872",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
"@id": "CVE-2026-20873",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
"@id": "CVE-2026-20874",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
"@id": "CVE-2026-20875",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
"@id": "CVE-2026-20877",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
"@id": "CVE-2026-20918",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
"@id": "CVE-2026-20919",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
"@id": "CVE-2026-20921",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
"@id": "CVE-2026-20922",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
"@id": "CVE-2026-20923",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
"@id": "CVE-2026-20924",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
"@id": "CVE-2026-20925",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
"@id": "CVE-2026-20926",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
"@id": "CVE-2026-20927",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
"@id": "CVE-2026-20929",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
"@id": "CVE-2026-20931",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
"@id": "CVE-2026-20932",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
"@id": "CVE-2026-20934",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
"@id": "CVE-2026-20936",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
"@id": "CVE-2026-20937",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
"@id": "CVE-2026-20939",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
"@id": "CVE-2026-20940",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
"@id": "CVE-2026-20962",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
"@id": "CVE-2026-21265",
"@source": "CVE"
},
{
"#text": "https://msrc.microsoft.com/update-guide/en-us",
"@id": "https://msrc.microsoft.com/update-guide/en-us",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2026-001582
Vulnerability from jvndb - Published: 2026-01-21 12:11 - Updated:2026-01-21 12:11Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability
CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability
CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability
CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability
CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability
CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability
CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability
CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability
CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
References
| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"dc:date": "2026-01-21T12:11+09:00",
"dcterms:issued": "2026-01-21T12:11+09:00",
"dcterms:modified": "2026-01-21T12:11+09:00",
"description": "CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability\r\nCVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability\r\nCVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62458 | Win32k Elevation of Privilege Vulnerability\r\nCVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability\r\nCVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability\r\nCVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability\r\nCVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability\r\nCVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability\r\nCVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability\r\nCVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability",
"link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2026-001582",
"sec:references": [
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-54100",
"@id": "CVE-2025-54100",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-55233",
"@id": "CVE-2025-55233",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59516",
"@id": "CVE-2025-59516",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-59517",
"@id": "CVE-2025-59517",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62221",
"@id": "CVE-2025-62221",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62454",
"@id": "CVE-2025-62454",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62455",
"@id": "CVE-2025-62455",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62457",
"@id": "CVE-2025-62457",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62458",
"@id": "CVE-2025-62458",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62461",
"@id": "CVE-2025-62461",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62462",
"@id": "CVE-2025-62462",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62463",
"@id": "CVE-2025-62463",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62464",
"@id": "CVE-2025-62464",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62466",
"@id": "CVE-2025-62466",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62467",
"@id": "CVE-2025-62467",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62470",
"@id": "CVE-2025-62470",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62472",
"@id": "CVE-2025-62472",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62473",
"@id": "CVE-2025-62473",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62474",
"@id": "CVE-2025-62474",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62549",
"@id": "CVE-2025-62549",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62565",
"@id": "CVE-2025-62565",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62567",
"@id": "CVE-2025-62567",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62571",
"@id": "CVE-2025-62571",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-62573",
"@id": "CVE-2025-62573",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64658",
"@id": "CVE-2025-64658",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64661",
"@id": "CVE-2025-64661",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64670",
"@id": "CVE-2025-64670",
"@source": "CVE"
},
{
"#text": "https://www.cve.org/CVERecord?id=CVE-2025-64673",
"@id": "CVE-2025-64673",
"@source": "CVE"
},
{
"#text": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@id": "https://portal.msrc.microsoft.com/en-US/security-guidance",
"@source": "Related document"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2024-003026
Vulnerability from jvndb - Published: 2024-03-27 15:52 - Updated:2024-03-27 15:52Summary
Security information for Hitachi Disk Array Systems
Details
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
References
| Type | URL | |
|---|---|---|
Impacted products
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"dc:date": "2024-03-27T15:52+09:00",
"dcterms:issued": "2024-03-27T15:52+09:00",
"dcterms:modified": "2024-03-27T15:52+09:00",
"description": "Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.",
"link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
"sec:cpe": [
{
"#text": "cpe:/h:hitachi:unified_storage",
"@product": "Hitachi Unified Storage",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
{
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
}
],
"sec:identifier": "JVNDB-2024-003026",
"sec:references": [
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407",
"@id": "CVE-2022-36407",
"@source": "CVE"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
}
],
"title": "Security information for Hitachi Disk Array Systems"
}
JVNDB-2020-001545
Vulnerability from jvndb - Published: 2020-02-14 15:34 - Updated:2020-02-14 15:34Summary
Security information for Hitachi Disk Array Systems
Details
A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.
References
| Type | URL | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"dc:date": "2020-02-14T15:34+09:00",
"dcterms:issued": "2020-02-14T15:34+09:00",
"dcterms:modified": "2020-02-14T15:34+09:00",
"description": "A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.",
"link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
"sec:cpe": {
"#text": "cpe:/h:hitachi:virtual_storage_platform",
"@product": "Hitachi Virtual Storage Platform",
"@vendor": "Hitachi, Ltd",
"@version": "2.2"
},
"sec:identifier": "JVNDB-2020-001545",
"sec:references": {
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-noinfo",
"@title": "No Mapping(CWE-noinfo)"
},
"title": "Security information for Hitachi Disk Array Systems"
}