Search criteria Use full-text search for keyword queries.
Combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by dates instead of relevance.

10 vulnerabilities found for Hitachi Virtual Storage Platform by Hitachi, Ltd

JVNDB-2026-009406

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2026-20846 | GDI+ Denial of Service Vulnerability CVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability CVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability CVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability CVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability CVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability CVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability CVE-2026-21249 | Windows NTLM Spoofing Vulnerability CVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability CVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability CVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability CVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability CVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability CVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability CVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability CVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "CVE-2026-20846 | GDI+ Denial of Service Vulnerability\r\nCVE-2026-21222 | Windows Kernel Information Disclosure Vulnerability\r\nCVE-2026-21231 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21234 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-21235 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21236 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21237 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21238 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-21239 | Windows Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-21240 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-21242 | Windows Subsystem for Linux Elevation of Privilege Vulnerability\r\nCVE-2026-21244 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21246 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-21247 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21248 | Windows Hyper-V Remote Code Execution Vulnerability\r\nCVE-2026-21249 | Windows NTLM Spoofing Vulnerability\r\nCVE-2026-21253 | Mailslot File System Elevation of Privilege Vulnerability\r\nCVE-2026-21255 | Windows Hyper-V Security Feature Bypass Vulnerability\r\nCVE-2026-21508 | Windows Storage Elevation of Privilege Vulnerability\r\nCVE-2026-21510 | Windows Shell Security Feature Bypass Vulnerability\r\nCVE-2026-21513 | MSHTML Framework Security Feature Bypass Vulnerability\r\nCVE-2026-21519 | Desktop Window Manager Elevation of Privilege Vulnerability\r\nCVE-2026-21525 | Windows Remote Access Connection Manager Denial of Service Vulnerability\r\nCVE-2026-21533 | Windows Remote Desktop Services Elevation of Privilege Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009406.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009406",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20846",
      "@id": "CVE-2026-20846",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21222",
      "@id": "CVE-2026-21222",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21231",
      "@id": "CVE-2026-21231",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21234",
      "@id": "CVE-2026-21234",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21235",
      "@id": "CVE-2026-21235",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21236",
      "@id": "CVE-2026-21236",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21237",
      "@id": "CVE-2026-21237",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21238",
      "@id": "CVE-2026-21238",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21239",
      "@id": "CVE-2026-21239",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21240",
      "@id": "CVE-2026-21240",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21242",
      "@id": "CVE-2026-21242",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21244",
      "@id": "CVE-2026-21244",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21246",
      "@id": "CVE-2026-21246",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21247",
      "@id": "CVE-2026-21247",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21248",
      "@id": "CVE-2026-21248",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21249",
      "@id": "CVE-2026-21249",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21253",
      "@id": "CVE-2026-21253",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21255",
      "@id": "CVE-2026-21255",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21508",
      "@id": "CVE-2026-21508",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21510",
      "@id": "CVE-2026-21510",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21513",
      "@id": "CVE-2026-21513",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21519",
      "@id": "CVE-2026-21519",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21525",
      "@id": "CVE-2026-21525",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21533",
      "@id": "CVE-2026-21533",
      "@source": "CVE"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009409

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management software (Storage Navigator) of Hitachi Disk Array Systems that involves remote code execution vulnerability. CVE-2025-1978",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009409.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009409",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-1978",
    "@id": "CVE-2025-1978",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009408

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves OS command injection. CVE-2025-9661",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009408.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009408",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-9661",
    "@id": "CVE-2025-9661",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009411

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the management gui (maintenance utility) of Hitachi Disk Array Systems that involves improper authorization vulnerability. CVE-2025-2902",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009411.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009411",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-2902",
    "@id": "CVE-2025-2902",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009412

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in Hitachi Disk Array Systems that involves Improper Restriction of Excessive Authentication Attempts vulnerability. CVE-2025-2514",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009412.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009412",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-2514",
    "@id": "CVE-2025-2514",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-009410

Vulnerability from jvndb - Published: 2026-03-31 15:53 - Updated:2026-03-31 15:53
Summary
Security information for Hitachi Disk Array Systems
Details
A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
  "dc:date": "2026-03-31T15:53+09:00",
  "dcterms:issued": "2026-03-31T15:53+09:00",
  "dcterms:modified": "2026-03-31T15:53+09:00",
  "description": "A vulnerability exists in the firmware replacement function of Hitachi Disk Array Systems that involves improper input validation. CVE-2025-0824",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-009410.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-009410",
  "sec:references": {
    "#text": "https://www.cve.org/CVERecord?id=CVE-2025-0824",
    "@id": "CVE-2025-0824",
    "@source": "CVE"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-004359

Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability CVE-2026-20804 | Windows Hello Tampering Vulnerability CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20812 | LDAP Tampering Vulnerability CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability CVE-2026-20834 | Windows Spoofing Vulnerability CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability CVE-2026-20852 | Windows Hello Tampering Vulnerability CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
References
CVE https://www.cve.org/CVERecord?id=CVE-2023-31096
CVE https://www.cve.org/CVERecord?id=CVE-2024-55414
CVE https://www.cve.org/CVERecord?id=CVE-2026-20804
CVE https://www.cve.org/CVERecord?id=CVE-2026-20805
CVE https://www.cve.org/CVERecord?id=CVE-2026-20809
CVE https://www.cve.org/CVERecord?id=CVE-2026-20810
CVE https://www.cve.org/CVERecord?id=CVE-2026-20812
CVE https://www.cve.org/CVERecord?id=CVE-2026-20814
CVE https://www.cve.org/CVERecord?id=CVE-2026-20816
CVE https://www.cve.org/CVERecord?id=CVE-2026-20817
CVE https://www.cve.org/CVERecord?id=CVE-2026-20820
CVE https://www.cve.org/CVERecord?id=CVE-2026-20821
CVE https://www.cve.org/CVERecord?id=CVE-2026-20822
CVE https://www.cve.org/CVERecord?id=CVE-2026-20823
CVE https://www.cve.org/CVERecord?id=CVE-2026-20824
CVE https://www.cve.org/CVERecord?id=CVE-2026-20825
CVE https://www.cve.org/CVERecord?id=CVE-2026-20826
CVE https://www.cve.org/CVERecord?id=CVE-2026-20827
CVE https://www.cve.org/CVERecord?id=CVE-2026-20828
CVE https://www.cve.org/CVERecord?id=CVE-2026-20829
CVE https://www.cve.org/CVERecord?id=CVE-2026-20831
CVE https://www.cve.org/CVERecord?id=CVE-2026-20832
CVE https://www.cve.org/CVERecord?id=CVE-2026-20834
CVE https://www.cve.org/CVERecord?id=CVE-2026-20836
CVE https://www.cve.org/CVERecord?id=CVE-2026-20837
CVE https://www.cve.org/CVERecord?id=CVE-2026-20839
CVE https://www.cve.org/CVERecord?id=CVE-2026-20840
CVE https://www.cve.org/CVERecord?id=CVE-2026-20842
CVE https://www.cve.org/CVERecord?id=CVE-2026-20843
CVE https://www.cve.org/CVERecord?id=CVE-2026-20844
CVE https://www.cve.org/CVERecord?id=CVE-2026-20847
CVE https://www.cve.org/CVERecord?id=CVE-2026-20848
CVE https://www.cve.org/CVERecord?id=CVE-2026-20849
CVE https://www.cve.org/CVERecord?id=CVE-2026-20852
CVE https://www.cve.org/CVERecord?id=CVE-2026-20853
CVE https://www.cve.org/CVERecord?id=CVE-2026-20856
CVE https://www.cve.org/CVERecord?id=CVE-2026-20857
CVE https://www.cve.org/CVERecord?id=CVE-2026-20858
CVE https://www.cve.org/CVERecord?id=CVE-2026-20860
CVE https://www.cve.org/CVERecord?id=CVE-2026-20861
CVE https://www.cve.org/CVERecord?id=CVE-2026-20862
CVE https://www.cve.org/CVERecord?id=CVE-2026-20864
CVE https://www.cve.org/CVERecord?id=CVE-2026-20865
CVE https://www.cve.org/CVERecord?id=CVE-2026-20866
CVE https://www.cve.org/CVERecord?id=CVE-2026-20867
CVE https://www.cve.org/CVERecord?id=CVE-2026-20868
CVE https://www.cve.org/CVERecord?id=CVE-2026-20869
CVE https://www.cve.org/CVERecord?id=CVE-2026-20871
CVE https://www.cve.org/CVERecord?id=CVE-2026-20872
CVE https://www.cve.org/CVERecord?id=CVE-2026-20873
CVE https://www.cve.org/CVERecord?id=CVE-2026-20874
CVE https://www.cve.org/CVERecord?id=CVE-2026-20875
CVE https://www.cve.org/CVERecord?id=CVE-2026-20877
CVE https://www.cve.org/CVERecord?id=CVE-2026-20918
CVE https://www.cve.org/CVERecord?id=CVE-2026-20919
CVE https://www.cve.org/CVERecord?id=CVE-2026-20921
CVE https://www.cve.org/CVERecord?id=CVE-2026-20922
CVE https://www.cve.org/CVERecord?id=CVE-2026-20923
CVE https://www.cve.org/CVERecord?id=CVE-2026-20924
CVE https://www.cve.org/CVERecord?id=CVE-2026-20925
CVE https://www.cve.org/CVERecord?id=CVE-2026-20926
CVE https://www.cve.org/CVERecord?id=CVE-2026-20927
CVE https://www.cve.org/CVERecord?id=CVE-2026-20929
CVE https://www.cve.org/CVERecord?id=CVE-2026-20931
CVE https://www.cve.org/CVERecord?id=CVE-2026-20932
CVE https://www.cve.org/CVERecord?id=CVE-2026-20934
CVE https://www.cve.org/CVERecord?id=CVE-2026-20936
CVE https://www.cve.org/CVERecord?id=CVE-2026-20937
CVE https://www.cve.org/CVERecord?id=CVE-2026-20939
CVE https://www.cve.org/CVERecord?id=CVE-2026-20940
CVE https://www.cve.org/CVERecord?id=CVE-2026-20962
CVE https://www.cve.org/CVERecord?id=CVE-2026-21265
Related document https://msrc.microsoft.com/update-guide/en-us
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "dc:date": "2026-02-20T18:35+09:00",
  "dcterms:issued": "2026-02-20T18:35+09:00",
  "dcterms:modified": "2026-02-20T18:35+09:00",
  "description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-004359",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
      "@id": "CVE-2023-31096",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
      "@id": "CVE-2024-55414",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
      "@id": "CVE-2026-20804",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
      "@id": "CVE-2026-20805",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
      "@id": "CVE-2026-20809",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
      "@id": "CVE-2026-20810",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
      "@id": "CVE-2026-20812",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
      "@id": "CVE-2026-20814",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
      "@id": "CVE-2026-20816",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
      "@id": "CVE-2026-20817",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
      "@id": "CVE-2026-20820",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
      "@id": "CVE-2026-20821",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
      "@id": "CVE-2026-20822",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
      "@id": "CVE-2026-20823",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
      "@id": "CVE-2026-20824",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
      "@id": "CVE-2026-20825",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
      "@id": "CVE-2026-20826",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
      "@id": "CVE-2026-20827",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
      "@id": "CVE-2026-20828",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
      "@id": "CVE-2026-20829",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
      "@id": "CVE-2026-20831",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
      "@id": "CVE-2026-20832",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
      "@id": "CVE-2026-20834",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
      "@id": "CVE-2026-20836",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
      "@id": "CVE-2026-20837",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
      "@id": "CVE-2026-20839",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
      "@id": "CVE-2026-20840",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
      "@id": "CVE-2026-20842",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
      "@id": "CVE-2026-20843",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
      "@id": "CVE-2026-20844",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
      "@id": "CVE-2026-20847",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
      "@id": "CVE-2026-20848",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
      "@id": "CVE-2026-20849",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
      "@id": "CVE-2026-20852",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
      "@id": "CVE-2026-20853",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
      "@id": "CVE-2026-20856",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
      "@id": "CVE-2026-20857",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
      "@id": "CVE-2026-20858",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
      "@id": "CVE-2026-20860",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
      "@id": "CVE-2026-20861",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
      "@id": "CVE-2026-20862",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
      "@id": "CVE-2026-20864",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
      "@id": "CVE-2026-20865",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
      "@id": "CVE-2026-20866",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
      "@id": "CVE-2026-20867",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
      "@id": "CVE-2026-20868",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
      "@id": "CVE-2026-20869",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
      "@id": "CVE-2026-20871",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
      "@id": "CVE-2026-20872",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
      "@id": "CVE-2026-20873",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
      "@id": "CVE-2026-20874",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
      "@id": "CVE-2026-20875",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
      "@id": "CVE-2026-20877",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
      "@id": "CVE-2026-20918",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
      "@id": "CVE-2026-20919",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
      "@id": "CVE-2026-20921",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
      "@id": "CVE-2026-20922",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
      "@id": "CVE-2026-20923",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
      "@id": "CVE-2026-20924",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
      "@id": "CVE-2026-20925",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
      "@id": "CVE-2026-20926",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
      "@id": "CVE-2026-20927",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
      "@id": "CVE-2026-20929",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
      "@id": "CVE-2026-20931",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
      "@id": "CVE-2026-20932",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
      "@id": "CVE-2026-20934",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
      "@id": "CVE-2026-20936",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
      "@id": "CVE-2026-20937",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
      "@id": "CVE-2026-20939",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
      "@id": "CVE-2026-20940",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
      "@id": "CVE-2026-20962",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
      "@id": "CVE-2026-21265",
      "@source": "CVE"
    },
    {
      "#text": "https://msrc.microsoft.com/update-guide/en-us",
      "@id": "https://msrc.microsoft.com/update-guide/en-us",
      "@source": "Related document"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2026-001582

Vulnerability from jvndb - Published: 2026-01-21 12:11 - Updated:2026-01-21 12:11
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability CVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability CVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability CVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability CVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2025-62458 | Win32k Elevation of Privilege Vulnerability CVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability CVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability CVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability CVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability CVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability CVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability CVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability CVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability CVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability CVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability CVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability CVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability CVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability
References
CVE https://www.cve.org/CVERecord?id=CVE-2025-54100
CVE https://www.cve.org/CVERecord?id=CVE-2025-55233
CVE https://www.cve.org/CVERecord?id=CVE-2025-59516
CVE https://www.cve.org/CVERecord?id=CVE-2025-59517
CVE https://www.cve.org/CVERecord?id=CVE-2025-62221
CVE https://www.cve.org/CVERecord?id=CVE-2025-62454
CVE https://www.cve.org/CVERecord?id=CVE-2025-62455
CVE https://www.cve.org/CVERecord?id=CVE-2025-62457
CVE https://www.cve.org/CVERecord?id=CVE-2025-62458
CVE https://www.cve.org/CVERecord?id=CVE-2025-62461
CVE https://www.cve.org/CVERecord?id=CVE-2025-62462
CVE https://www.cve.org/CVERecord?id=CVE-2025-62463
CVE https://www.cve.org/CVERecord?id=CVE-2025-62464
CVE https://www.cve.org/CVERecord?id=CVE-2025-62466
CVE https://www.cve.org/CVERecord?id=CVE-2025-62467
CVE https://www.cve.org/CVERecord?id=CVE-2025-62470
CVE https://www.cve.org/CVERecord?id=CVE-2025-62472
CVE https://www.cve.org/CVERecord?id=CVE-2025-62473
CVE https://www.cve.org/CVERecord?id=CVE-2025-62474
CVE https://www.cve.org/CVERecord?id=CVE-2025-62549
CVE https://www.cve.org/CVERecord?id=CVE-2025-62565
CVE https://www.cve.org/CVERecord?id=CVE-2025-62567
CVE https://www.cve.org/CVERecord?id=CVE-2025-62571
CVE https://www.cve.org/CVERecord?id=CVE-2025-62573
CVE https://www.cve.org/CVERecord?id=CVE-2025-64658
CVE https://www.cve.org/CVERecord?id=CVE-2025-64661
CVE https://www.cve.org/CVERecord?id=CVE-2025-64670
CVE https://www.cve.org/CVERecord?id=CVE-2025-64673
Related document https://portal.msrc.microsoft.com/en-US/security-guidance
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
  "dc:date": "2026-01-21T12:11+09:00",
  "dcterms:issued": "2026-01-21T12:11+09:00",
  "dcterms:modified": "2026-01-21T12:11+09:00",
  "description": "CVE-2025-54100 | PowerShell Remote Code Execution Vulnerability\r\nCVE-2025-55233 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-59516 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-59517 | Windows Storage VSP Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62221 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62454 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62455 | Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability\r\nCVE-2025-62457 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62458 | Win32k Elevation of Privilege Vulnerability\r\nCVE-2025-62461 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62462 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62463 | DirectX Graphics Kernel Denial of Service Vulnerability\r\nCVE-2025-62464 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62466 | Windows Client-Side Caching Elevation of Privilege Vulnerability\r\nCVE-2025-62467 | Windows Projected File System Elevation of Privilege Vulnerability\r\nCVE-2025-62470 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2025-62472 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62473 | Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability\r\nCVE-2025-62474 | Windows Remote Access Connection Manager Elevation of Privilege Vulnerability\r\nCVE-2025-62549 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2025-62565 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-62567 | Windows Hyper-V Denial of Service Vulnerability\r\nCVE-2025-62571 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2025-62573 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2025-64658 | Windows File Explorer Elevation of Privilege Vulnerability\r\nCVE-2025-64661 | Windows Shell Elevation of Privilege Vulnerability\r\nCVE-2025-64670 | Windows DirectX Information Disclosure Vulnerability\r\nCVE-2025-64673 | Windows Storage VSP Driver Elevation of Privilege Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-001582.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-001582",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-54100",
      "@id": "CVE-2025-54100",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-55233",
      "@id": "CVE-2025-55233",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-59516",
      "@id": "CVE-2025-59516",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-59517",
      "@id": "CVE-2025-59517",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62221",
      "@id": "CVE-2025-62221",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62454",
      "@id": "CVE-2025-62454",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62455",
      "@id": "CVE-2025-62455",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62457",
      "@id": "CVE-2025-62457",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62458",
      "@id": "CVE-2025-62458",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62461",
      "@id": "CVE-2025-62461",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62462",
      "@id": "CVE-2025-62462",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62463",
      "@id": "CVE-2025-62463",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62464",
      "@id": "CVE-2025-62464",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62466",
      "@id": "CVE-2025-62466",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62467",
      "@id": "CVE-2025-62467",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62470",
      "@id": "CVE-2025-62470",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62472",
      "@id": "CVE-2025-62472",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62473",
      "@id": "CVE-2025-62473",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62474",
      "@id": "CVE-2025-62474",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62549",
      "@id": "CVE-2025-62549",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62565",
      "@id": "CVE-2025-62565",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62567",
      "@id": "CVE-2025-62567",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62571",
      "@id": "CVE-2025-62571",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-62573",
      "@id": "CVE-2025-62573",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64658",
      "@id": "CVE-2025-64658",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64661",
      "@id": "CVE-2025-64661",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64670",
      "@id": "CVE-2025-64670",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2025-64673",
      "@id": "CVE-2025-64673",
      "@source": "CVE"
    },
    {
      "#text": "https://portal.msrc.microsoft.com/en-US/security-guidance",
      "@id": "https://portal.msrc.microsoft.com/en-US/security-guidance",
      "@source": "Related document"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2024-003026

Vulnerability from jvndb - Published: 2024-03-27 15:52 - Updated:2024-03-27 15:52
Summary
Security information for Hitachi Disk Array Systems
Details
Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
  "dc:date": "2024-03-27T15:52+09:00",
  "dcterms:issued": "2024-03-27T15:52+09:00",
  "dcterms:modified": "2024-03-27T15:52+09:00",
  "description": "Log files of Hitachi Disk Array Systems have the CVE-2022-36407 Plaintext Storage of Passwords vulnerability.",
  "link": "https://jvndb.jvn.jp/en/contents/2024/JVNDB-2024-003026.html",
  "sec:cpe": [
    {
      "#text": "cpe:/h:hitachi:unified_storage",
      "@product": "Hitachi Unified Storage",
      "@vendor": "Hitachi, Ltd",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:hitachi:virtual_storage_platform",
      "@product": "Hitachi Virtual Storage Platform",
      "@vendor": "Hitachi, Ltd",
      "@version": "2.2"
    }
  ],
  "sec:identifier": "JVNDB-2024-003026",
  "sec:references": [
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36407",
      "@id": "CVE-2022-36407",
      "@source": "CVE"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-noinfo",
      "@title": "No Mapping(CWE-noinfo)"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}

JVNDB-2020-001545

Vulnerability from jvndb - Published: 2020-02-14 15:34 - Updated:2020-02-14 15:34
Summary
Security information for Hitachi Disk Array Systems
Details
A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.
References
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
  "dc:date": "2020-02-14T15:34+09:00",
  "dcterms:issued": "2020-02-14T15:34+09:00",
  "dcterms:modified": "2020-02-14T15:34+09:00",
  "description": "A cross site scripting vulnerability exists in the SVP(Storage Navigator) of the Hitachi disk array system.",
  "link": "https://jvndb.jvn.jp/en/contents/2020/JVNDB-2020-001545.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2020-001545",
  "sec:references": {
    "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
    "@id": "CWE-noinfo",
    "@title": "No Mapping(CWE-noinfo)"
  },
  "title": "Security information for Hitachi Disk Array Systems"
}