VAR-201002-0399
Vulnerability from variot - Updated: 2022-05-17 01:51Hitachi JP1/Cm2/Network Node Manager is prone to a security vulnerability because it sets insecure file permissions. An attacker can exploit this issue to obtain sensitive information or gain escalated privileges. ----------------------------------------------------------------------
Use WSUS to deploy 3rd party patches
Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/
TITLE: Hitachi JP1/Cm2/Network Node Manager Remote Console Insecure File Permissions
SECUNIA ADVISORY ID: SA38740
VERIFY ADVISORY: http://secunia.com/advisories/38740/
DESCRIPTION: Hitachi has acknowledged a security issue in Hitachi JP1/Cm2/Network Node Manager, which can be exploited by malicious, local users to manipulate certain data and potentially gain escalated privileges.
The security issue is reported in the following products and versions: * JP1/Cm2/Network Node Manager Enterprise version 06-51 to 06-71 * JP1/Cm2/Network Node Manager 250 version 06-51 to 06-71 * JP1/Cm2/Network Node Manager version 07-00 to 07-10 * JP1/Cm2/Network Node Manager Starter Edition Enterprise version 08-00 to 08-10 * JP1/Cm2/Network Node Manager Starter Edition 250 version 08-00 to 08-10
SOLUTION: Restrict access to trusted users only.
PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.
ORIGINAL ADVISORY: http://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS10-002/index.html
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201002-0399",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "jp1/cm2/network node manager starter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25008-10-01"
},
{
"model": "jp1/cm2/network node manager starter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25008-10"
},
{
"model": "jp1/cm2/network node manager starter edition windows",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25008-00-03"
},
{
"model": "jp1/cm2/network node manager starter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25008-00-02"
},
{
"model": "jp1/cm2/network node manager starter edition",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25008-00"
},
{
"model": "jp1/cm2/network node manager starter ed enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "08-10-01"
},
{
"model": "jp1/cm2/network node manager starter ed enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "08-10"
},
{
"model": "jp1/cm2/network node manager starter ed enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "08-00-02"
},
{
"model": "jp1/cm2/network node manager starter ed enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "08-00-01"
},
{
"model": "jp1/cm2/network node manager starter ed enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "08-00"
},
{
"model": "jp1/cm2/network node manager enterprise 06-71-/c",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "jp1/cm2/network node manager enterprise 06-71-/b",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "jp1/cm2/network node manager enterprise 06-71-/a",
"scope": null,
"trust": 0.3,
"vendor": "hitachi",
"version": null
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-70"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-69"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-68"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-67"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-66"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-65"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-64"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-63"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-62"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-61"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-60"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-59"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-58"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-57"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-56"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-55"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-54"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-53"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-52"
},
{
"model": "jp1/cm2/network node manager enterprise",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "06-51"
},
{
"model": "jp1/cm2/network node manager 06-71-/d",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "250"
},
{
"model": "jp1/cm2/network node manager 06-71-/c",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "250"
},
{
"model": "jp1/cm2/network node manager 06-71-/b",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "250"
},
{
"model": "jp1/cm2/network node manager 06-71-/a",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "250"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-70"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-69"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-68"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-67"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-66"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-65"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-64"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-63"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-62"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-61"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-60"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-59"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-58"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-57"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-56"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-55"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-54"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-53"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-52"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "25006-51"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-10"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-09"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-08"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-07"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-06"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-05"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-04"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-03"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-02"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-01"
},
{
"model": "jp1/cm2/network node manager",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "07-00"
}
],
"sources": [
{
"db": "BID",
"id": "38428"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The vendor reported this issue.",
"sources": [
{
"db": "BID",
"id": "38428"
}
],
"trust": 0.3
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hitachi JP1/Cm2/Network Node Manager is prone to a security vulnerability because it sets insecure file permissions. \nAn attacker can exploit this issue to obtain sensitive information or gain escalated privileges. ----------------------------------------------------------------------\n\n\nUse WSUS to deploy 3rd party patches\n\nPublic BETA\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nHitachi JP1/Cm2/Network Node Manager Remote Console Insecure File\nPermissions\n\nSECUNIA ADVISORY ID:\nSA38740\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38740/\n\nDESCRIPTION:\nHitachi has acknowledged a security issue in Hitachi JP1/Cm2/Network\nNode Manager, which can be exploited by malicious, local users to\nmanipulate certain data and potentially gain escalated privileges. \n\nThe security issue is reported in the following products and\nversions:\n* JP1/Cm2/Network Node Manager Enterprise version 06-51 to 06-71\n* JP1/Cm2/Network Node Manager 250 version 06-51 to 06-71\n* JP1/Cm2/Network Node Manager version 07-00 to 07-10\n* JP1/Cm2/Network Node Manager Starter Edition Enterprise version\n08-00 to 08-10\n* JP1/Cm2/Network Node Manager Starter Edition 250 version 08-00 to\n08-10\n\nSOLUTION:\nRestrict access to trusted users only. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/HS10-002/index.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
"sources": [
{
"db": "BID",
"id": "38428"
},
{
"db": "PACKETSTORM",
"id": "86742"
}
],
"trust": 0.36
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "HITACHI",
"id": "HS10-002",
"trust": 0.4
},
{
"db": "BID",
"id": "38428",
"trust": 0.3
},
{
"db": "SECUNIA",
"id": "38740",
"trust": 0.2
},
{
"db": "PACKETSTORM",
"id": "86742",
"trust": 0.1
}
],
"sources": [
{
"db": "BID",
"id": "38428"
},
{
"db": "PACKETSTORM",
"id": "86742"
}
]
},
"id": "VAR-201002-0399",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.12908497
},
"last_update_date": "2022-05-17T01:51:51.037000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.4,
"url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs10-002/index.html"
},
{
"trust": 0.3,
"url": "http://www.hitachi.com/index.html"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/secunia_security_advisories/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/38740/"
},
{
"trust": 0.1,
"url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
},
{
"trust": 0.1,
"url": "http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/"
},
{
"trust": 0.1,
"url": "http://secunia.com/advisories/about_secunia_advisories/"
}
],
"sources": [
{
"db": "BID",
"id": "38428"
},
{
"db": "PACKETSTORM",
"id": "86742"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "38428"
},
{
"db": "PACKETSTORM",
"id": "86742"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-02-26T00:00:00",
"db": "BID",
"id": "38428"
},
{
"date": "2010-02-26T16:07:26",
"db": "PACKETSTORM",
"id": "86742"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2010-02-26T00:00:00",
"db": "BID",
"id": "38428"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "38428"
},
{
"db": "PACKETSTORM",
"id": "86742"
}
],
"trust": 0.4
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hitachi JP1/Cm2/Network Node Manager Insecure File Permissions Vulnerability",
"sources": [
{
"db": "BID",
"id": "38428"
}
],
"trust": 0.3
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "38428"
}
],
"trust": 0.3
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.