All the vulnerabilites related to Hitachi - Hitachi Ops Center Analyzer
cve-2020-36605
Vulnerability from cvelistv5
Published
2022-11-01 02:07
Modified
2024-08-04 17:30
Severity ?
EPSS score ?
Summary
File Permissions Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer, Hitachi Ops Center Viewpoint
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.464Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Analytics probe" ], "platforms": [ "Linux" ], "product": "Hitachi Infrastructure Analytics Advisor", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "4.4.0-00", "status": "affected", "version": "2.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Analyzer probe" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-00", "status": "unaffected" } ], "lessThan": "10.9.0-00", "status": "affected", "version": "10.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Viewpoint RAID Agent" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Viewpoint", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-00", "status": "unaffected" } ], "lessThan": "10.9.0-00", "status": "affected", "version": "10.8.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eIncorrect Default Permissions vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component), Hitachi Ops Center Viewpoint on Linux (Viewpoint RAID Agent component) allows local users to read and write specific files.\u003c/span\u003e\n\n\u003cbr\u003e\u003cbr\u003eThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00; Hitachi Ops Center Viewpoint: from 10.8.0-00 before 10.9.0-00.\u003cbr\u003e" } ], "value": "Incorrect Default Permissions vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component), Hitachi Ops Center Viewpoint on Linux (Viewpoint RAID Agent component) allows local users to read and write specific files.\n\n\n\nThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00; Hitachi Ops Center Viewpoint: from 10.8.0-00 before 10.9.0-00.\n" } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T04:23:27.652Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "source": { "advisory": "hitachi-sec-2022-134", "discovery": "UNKNOWN" }, "title": "File Permissions Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer, Hitachi Ops Center Viewpoint", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2020-36605", "datePublished": "2022-11-01T02:07:14.263Z", "dateReserved": "2022-09-27T06:24:04.221Z", "dateUpdated": "2024-08-04T17:30:08.464Z", "requesterUserId": "a50f3adc-d641-48d6-b994-5cdc62b36cd5", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3884
Vulnerability from cvelistv5
Published
2023-02-28 02:01
Modified
2024-08-03 01:20
Severity ?
EPSS score ?
Summary
Directory Permission Vulnerability in Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi | Hitachi Ops Center Analyzer |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:20:58.784Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Hitachi Ops Center Analyzer RAID Agent" ], "platforms": [ "Windows" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-01", "status": "unaffected" } ], "lessThan": "10.9.0-01", "status": "affected", "version": "10.9.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect Default Permissions vulnerability in Hitachi Ops Center Analyzer on Windows (Hitachi Ops Center Analyzer RAID Agent component) allows local users to read and write specific files.\u003cp\u003eThis issue affects Hitachi Ops Center Analyzer: from 10.9.0-00 before 10.9.0-01.\u003c/p\u003e" } ], "value": "Incorrect Default Permissions vulnerability in Hitachi Ops Center Analyzer on Windows (Hitachi Ops Center Analyzer RAID Agent component) allows local users to read and write specific files.This issue affects Hitachi Ops Center Analyzer: from 10.9.0-00 before 10.9.0-01.\n\n" } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-28T02:01:26.105Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html" } ], "source": { "advisory": "hitachi-sec-2023-105", "discovery": "UNKNOWN" }, "title": "Directory Permission Vulnerability in Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-3884", "datePublished": "2023-02-28T02:01:26.105Z", "dateReserved": "2022-11-08T02:40:56.780Z", "dateUpdated": "2024-08-03T01:20:58.784Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-2493
Vulnerability from cvelistv5
Published
2024-04-23 05:35
Modified
2024-08-01 19:18
Severity ?
EPSS score ?
Summary
Session Hijacking Vulnerability in Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-122/index.html | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi | Hitachi Ops Center Analyzer |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:hitachi:alaxala:ax:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "alaxala", "vendor": "hitachi", "versions": [ { "status": "affected", "version": "10.0.0.00" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-2493", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-05-14T18:06:41.923686Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:29:47.849Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:18:46.461Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-122/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "11.0.1-00", "status": "unaffected" } ], "lessThan": "11.0.1-00", "status": "affected", "version": "10.0.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Session Hijacking vulnerability in Hitachi Ops Center Analyzer.\u003cp\u003eThis issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.1-00.\u003c/p\u003e" } ], "value": "Session Hijacking vulnerability in Hitachi Ops Center Analyzer.This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.1-00.\n\n" } ], "impacts": [ { "capecId": "CAPEC-593", "descriptions": [ { "lang": "en", "value": "CAPEC-593 Session Hijacking" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-614", "description": "CWE-614 Sensitive Cookie in HTTPS Session Without \u0027Secure\u0027 Attribute", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-04-23T05:35:57.491Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-122/index.html" } ], "source": { "advisory": "hitachi-sec-2024-122", "discovery": "UNKNOWN" }, "title": "Session Hijacking Vulnerability in Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2024-2493", "datePublished": "2024-04-23T05:35:57.491Z", "dateReserved": "2024-03-15T07:31:31.514Z", "dateUpdated": "2024-08-01T19:18:46.461Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41553
Vulnerability from cvelistv5
Published
2022-11-01 02:11
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
Information Exposure Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:46.456Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Analytics probe" ], "platforms": [ "Linux" ], "product": "Hitachi Infrastructure Analytics Advisor", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "4.4.0-00", "status": "affected", "version": "2.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Hitachi Ops Center Analyzer probe" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-00", "status": "unaffected" } ], "lessThan": "10.9.0-00", "status": "affected", "version": "10.0.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insertion of Sensitive Information into Temporary File vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer probe component) allows local users to gain sensitive information.\u003cbr\u003eThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00.\u003cbr\u003e" } ], "value": "Insertion of Sensitive Information into Temporary File vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer probe component) allows local users to gain sensitive information.\nThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00.\n" } ], "impacts": [ { "capecId": "CAPEC-114", "descriptions": [ { "lang": "en", "value": "CAPEC-114 Authentication Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T04:31:21.577Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "source": { "advisory": "hitachi-sec-2022-134", "discovery": "UNKNOWN" }, "title": "Information Exposure Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-41553", "datePublished": "2022-11-01T02:11:01.157Z", "dateReserved": "2022-09-26T06:04:20.832Z", "dateUpdated": "2024-08-03T12:42:46.456Z", "requesterUserId": "a50f3adc-d641-48d6-b994-5cdc62b36cd5", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-4895
Vulnerability from cvelistv5
Published
2023-02-28 02:03
Modified
2024-08-03 01:55
Severity ?
EPSS score ?
Summary
Man-in-the-middle attack Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:55:45.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Analytics probe" ], "platforms": [ "Linux" ], "product": "Hitachi Infrastructure Analytics Advisor", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "4.4.0-00", "status": "affected", "version": "2.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Analyzer probe" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.1-00", "status": "unaffected" } ], "lessThan": "10.9.1-00", "status": "affected", "version": "10.0.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper Certificate Validation vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component) allows Man in the Middle Attack.\u003cp\u003eThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.1-00.\u003c/p\u003e" } ], "value": "Improper Certificate Validation vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Analytics probe component), Hitachi Ops Center Analyzer on Linux (Analyzer probe component) allows Man in the Middle Attack.This issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.1-00.\n\n" } ], "impacts": [ { "capecId": "CAPEC-94", "descriptions": [ { "lang": "en", "value": "CAPEC-94 Man in the Middle Attack" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 8.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-28T02:03:52.626Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-105/index.html" } ], "source": { "advisory": "hitachi-sec-2023-105", "discovery": "UNKNOWN" }, "title": "Man-in-the-middle attack Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-4895", "datePublished": "2023-02-28T02:03:52.626Z", "dateReserved": "2023-01-23T06:32:40.178Z", "dateUpdated": "2024-08-03T01:55:45.912Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-36652
Vulnerability from cvelistv5
Published
2023-02-28 02:06
Modified
2024-08-04 17:30
Severity ?
EPSS score ?
Summary
File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-106/index.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T17:30:08.459Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-106/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Hitachi Automation Director", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "10.6.1-00", "status": "affected", "version": "8.2.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Hitachi Infrastructure Analytics Advisor", "Analytics probe server" ], "platforms": [ "Linux" ], "product": "Hitachi Infrastructure Analytics Advisor", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "4.0.0-00", "status": "affected", "version": "2.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Linux" ], "product": "Hitachi Ops Center Automator", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.1-00", "status": "unaffected" } ], "lessThan": "10.9.1-00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Hitachi Ops Center Analyzer", "Analyzer probe server" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.1-00", "status": "unaffected" } ], "lessThan": "10.9.1-00", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Viewpoint RAID Agent" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Viewpoint", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.1-00", "status": "unaffected" } ], "lessThan": "10.9.1-00", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Incorrect Default Permissions vulnerability in Hitachi Automation Director on Linux, Hitachi Infrastructure Analytics Advisor on Linux (Hitachi Infrastructure Analytics Advisor, Analytics probe server components), Hitachi Ops Center Automator on Linux, Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer, Analyzer probe server components), Hitachi Ops Center Viewpoint on Linux (Viewpoint RAID Agent component) allows local users to read and write specific files.\u003cbr\u003e\u003cbr\u003eThis issue affects Hitachi Automation Director: \n\nfrom 8.2.0-00 through 10.6.1-00; Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.0.0-00; Hitachi Ops Center Automator: before 10.9.1-00; Hitachi Ops Center Analyzer: before 10.9.1-00; Hitachi Ops Center Viewpoint: before 10.9.1-00.\u003cbr\u003e" } ], "value": "Incorrect Default Permissions vulnerability in Hitachi Automation Director on Linux, Hitachi Infrastructure Analytics Advisor on Linux (Hitachi Infrastructure Analytics Advisor, Analytics probe server components), Hitachi Ops Center Automator on Linux, Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer, Analyzer probe server components), Hitachi Ops Center Viewpoint on Linux (Viewpoint RAID Agent component) allows local users to read and write specific files.\n\nThis issue affects Hitachi Automation Director: \n\nfrom 8.2.0-00 through 10.6.1-00; Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.0.0-00; Hitachi Ops Center Automator: before 10.9.1-00; Hitachi Ops Center Analyzer: before 10.9.1-00; Hitachi Ops Center Viewpoint: before 10.9.1-00.\n" } ], "impacts": [ { "capecId": "CAPEC-165", "descriptions": [ { "lang": "en", "value": "CAPEC-165 File Manipulation" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-276", "description": "CWE-276 Incorrect Default Permissions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-28T02:06:32.073Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-106/index.html" } ], "source": { "advisory": "hitachi-sec-2023-106", "discovery": "UNKNOWN" }, "title": "File and Directory Permissions Vulnerability in Hitachi Automation Director, Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2020-36652", "datePublished": "2023-02-28T02:06:32.073Z", "dateReserved": "2023-01-17T01:44:42.055Z", "dateUpdated": "2024-08-04T17:30:08.459Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-3191
Vulnerability from cvelistv5
Published
2022-11-01 02:09
Modified
2024-08-03 01:00
Severity ?
EPSS score ?
Summary
Information Exposure Vulnerability in Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi | Hitachi Ops Center Analyzer |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T01:00:10.680Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Virtual Strage Software Agent" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-00", "status": "unaffected" } ], "lessThan": "10.9.0-00", "status": "affected", "version": "10.8.1-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Analyzer on Linux (Virtual Strage Software Agent component) allows local users to gain sensitive information.\u003cbr\u003eThis issue affects Hitachi Ops Center Analyzer: from 10.8.1-00 before 10.9.0-00\u003cbr\u003e" } ], "value": "Insertion of Sensitive Information into Log File vulnerability in Hitachi Ops Center Analyzer on Linux (Virtual Strage Software Agent component) allows local users to gain sensitive information.\nThis issue affects Hitachi Ops Center Analyzer: from 10.8.1-00 before 10.9.0-00\n" } ], "impacts": [ { "capecId": "CAPEC-114", "descriptions": [ { "lang": "en", "value": "CAPEC-114 Authentication Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532 Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T04:26:48.930Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "source": { "advisory": "hitachi-sec-2022-134", "discovery": "UNKNOWN" }, "title": "Information Exposure Vulnerability in Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-3191", "datePublished": "2022-11-01T02:09:13.688Z", "dateReserved": "2022-09-13T04:52:30.212Z", "dateUpdated": "2024-08-03T01:00:10.680Z", "requesterUserId": "a50f3adc-d641-48d6-b994-5cdc62b36cd5", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-41552
Vulnerability from cvelistv5
Published
2022-11-01 02:10
Modified
2024-08-03 12:42
Severity ?
EPSS score ?
Summary
Server-Side Request Forgery Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html | vendor-advisory |
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T12:42:46.276Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Data Center Analytics", "Analytics probe" ], "platforms": [ "Linux" ], "product": "Hitachi Infrastructure Analytics Advisor", "vendor": "Hitachi", "versions": [ { "lessThanOrEqual": "4.4.0-00", "status": "affected", "version": "2.0.0-00", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "modules": [ "Hitachi Ops Center Analyzer detail view", "Hitachi Ops Center Analyzer probe" ], "platforms": [ "Linux" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.0-00", "status": "unaffected" } ], "lessThan": "10.9.0-00", "status": "affected", "version": "10.0.0-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Server-Side Request Forgery (SSRF) vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Data Center Analytics, Analytics probe components), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer detail view, Hitachi Ops Center Analyzer probe components) allows Server Side Request Forgery.\u003cbr\u003eThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00.\u003cbr\u003e" } ], "value": "Server-Side Request Forgery (SSRF) vulnerability in Hitachi Infrastructure Analytics Advisor on Linux (Data Center Analytics, Analytics probe components), Hitachi Ops Center Analyzer on Linux (Hitachi Ops Center Analyzer detail view, Hitachi Ops Center Analyzer probe components) allows Server Side Request Forgery.\nThis issue affects Hitachi Infrastructure Analytics Advisor: from 2.0.0-00 through 4.4.0-00; Hitachi Ops Center Analyzer: from 10.0.0-00 before 10.9.0-00.\n" } ], "impacts": [ { "capecId": "CAPEC-664", "descriptions": [ { "lang": "en", "value": "CAPEC-664 Server Side Request Forgery" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-17T04:29:59.881Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2022-134/index.html" } ], "source": { "advisory": "hitachi-sec-2022-134", "discovery": "UNKNOWN" }, "title": "Server-Side Request Forgery Vulnerability in Hitachi Infrastructure Analytics Advisor, Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-41552", "datePublished": "2022-11-01T02:10:22.868Z", "dateReserved": "2022-09-26T06:04:20.832Z", "dateUpdated": "2024-08-03T12:42:46.276Z", "requesterUserId": "a50f3adc-d641-48d6-b994-5cdc62b36cd5", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-30469
Vulnerability from cvelistv5
Published
2023-05-23 01:02
Modified
2024-08-02 14:28
Severity ?
EPSS score ?
Summary
Reflrected Cross Site Scripting Vulnerability in Hitachi Ops Center Analyzer
References
▼ | URL | Tags |
---|---|---|
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-115/index.html | vendor-advisory |
Impacted products
▼ | Vendor | Product |
---|---|---|
Hitachi | Hitachi Ops Center Analyzer |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:28:51.384Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-115/index.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "Hitachi Ops Center Analyzer detail view" ], "platforms": [ "Linux", "64 bit" ], "product": "Hitachi Ops Center Analyzer", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "10.9.2-00", "status": "unaffected" } ], "lessThan": "10.9.2-00", "status": "affected", "version": "10.9.1-00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Cross-site Scripting vulnerability in Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component) allows Reflected XSS.\u003cp\u003eThis issue affects Hitachi Ops Center Analyzer: from 10.9.1-00 before 10.9.2-00.\u003c/p\u003e" } ], "value": "Cross-site Scripting vulnerability in Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component) allows Reflected XSS.This issue affects Hitachi Ops Center Analyzer: from 10.9.1-00 before 10.9.2-00.\n\n" } ], "impacts": [ { "capecId": "CAPEC-591", "descriptions": [ { "lang": "en", "value": "CAPEC-591 Reflected XSS" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-05-23T01:02:58.540Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-115/index.html" } ], "source": { "advisory": "hitachi-sec-2023-115", "discovery": "UNKNOWN" }, "title": "Reflrected Cross Site Scripting Vulnerability in Hitachi Ops Center Analyzer", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2023-30469", "datePublished": "2023-05-23T01:02:58.540Z", "dateReserved": "2023-04-11T06:24:58.129Z", "dateUpdated": "2024-08-02T14:28:51.384Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }