VAR-201211-0597
Vulnerability from variot - Updated: 2022-05-17 02:00Hitachi Device Manager is a set of mobile device management software from Hitachi, Japan. The software can manage multiple Hitachi storage systems through a single console and provides logical view capabilities to align storage assets with business applications. A denial of service vulnerability exists in Hitachi Device Manager. An attacker could use this vulnerability to consume a large amount of CPU resources and cause a denial of service. The following versions are affected: Hitachi Device Manager 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.6.0. Successful exploits will cause the application to become unresponsive, resulting in a denial-of-service condition
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201211-0597",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "device manager",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "7.6.0"
},
{
"model": "device manager",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "7.5.0"
},
{
"model": "device manager",
"scope": "eq",
"trust": 0.9,
"vendor": "hitachi",
"version": "7.4.1"
},
{
"model": "device manager",
"scope": "ne",
"trust": 0.9,
"vendor": "hitachi",
"version": "7.6.1"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.4-00"
},
{
"model": "device manager software )",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.4-00"
},
{
"model": "device manager software (solaris(op",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.4.0-00"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.3.1"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.2.1-00"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.1.0-00"
},
{
"model": "device manager software (solaris(sp",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.1.0-00"
},
{
"model": "device manager software (linux(sles",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.1.0-00"
},
{
"model": "device manager software (linux(rhel",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.1.0-00"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.1-02"
},
{
"model": "device manager software (linux(sles",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.1-02"
},
{
"model": "device manager software (linux(rhel",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.1-02"
},
{
"model": "device manager software",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.0-00"
},
{
"model": "device manager software (solaris(sp",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.0-00"
},
{
"model": "device manager software (linux(sles",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.0-00"
},
{
"model": "device manager software (linux(rhel",
"scope": "eq",
"trust": 0.3,
"vendor": "hitachi",
"version": "7.0.0-00"
}
],
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hitachi",
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
],
"trust": 1.8
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hitachi Device Manager is a set of mobile device management software from Hitachi, Japan. The software can manage multiple Hitachi storage systems through a single console and provides logical view capabilities to align storage assets with business applications. \nA denial of service vulnerability exists in Hitachi Device Manager. An attacker could use this vulnerability to consume a large amount of CPU resources and cause a denial of service. The following versions are affected: Hitachi Device Manager 7.3.1, 7.4.0, 7.4.1, 7.5.0, 7.6.0. \nSuccessful exploits will cause the application to become unresponsive, resulting in a denial-of-service condition",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
}
],
"trust": 1.08
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "BID",
"id": "65033",
"trust": 0.9
},
{
"db": "BID",
"id": "56573",
"trust": 0.9
},
{
"db": "HITACHI",
"id": "HS14-001",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339",
"trust": 0.6
}
],
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
]
},
"id": "VAR-201211-0597",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.46743295
},
"last_update_date": "2022-05-17T02:00:08.145000Z",
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 0.6,
"url": "http://www.hds.com/products/storage-software/hitachi-device-manager.html"
},
{
"trust": 0.6,
"url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs14-001/index.html"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/65033"
},
{
"trust": 0.6,
"url": "http://www.securityfocus.com/bid/56573"
}
],
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-01-17T00:00:00",
"db": "BID",
"id": "65033"
},
{
"date": "2012-11-16T00:00:00",
"db": "BID",
"id": "56573"
},
{
"date": "2014-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"date": "2012-11-20T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-01-17T00:00:00",
"db": "BID",
"id": "65033"
},
{
"date": "2012-11-16T00:00:00",
"db": "BID",
"id": "56573"
},
{
"date": "2014-01-26T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"date": "2012-12-05T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
},
{
"db": "CNNVD",
"id": "CNNVD-201211-339"
}
],
"trust": 1.2
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Hitachi Device Manager Host Data Collector Denial of Service Vulnerability",
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "CNNVD",
"id": "CNNVD-201401-472"
}
],
"trust": 0.9
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Unknown",
"sources": [
{
"db": "BID",
"id": "65033"
},
{
"db": "BID",
"id": "56573"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…