Search criteria
6 vulnerabilities found for jp1\/it_desktop_management_2-operations_director by hitachi
FKIE_CVE-2021-29645
Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Severity ?
7.0 (High) - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
"versionEndIncluding": "02-50-07",
"versionStartIncluding": "02-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
"versionEndIncluding": "03-00-12",
"versionStartIncluding": "03-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
"versionEndIncluding": "04-00-17",
"versionStartIncluding": "04-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
"versionEndIncluding": "04-50-16",
"versionStartIncluding": "04-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
"versionEndIncluding": "10-01-06",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
"versionEndIncluding": "10-50-11",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
"versionEndIncluding": "08-00-04",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
"versionEndIncluding": "08-10-05",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
"versionEndIncluding": "09-00-07",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
"versionEndIncluding": "09-51-15",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
"versionEndIncluding": "08-00-05",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
"versionEndIncluding": "08-00-07",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
"versionEndIncluding": "09-51-05",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
"versionEndIncluding": "10-00-02",
"versionStartIncluding": "10-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
"versionEndIncluding": "10-01-05",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
"versionEndIncluding": "10-02-05",
"versionStartIncluding": "10-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
"versionEndIncluding": "10-50-12",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
"versionEndIncluding": "11-00-11",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BC313F8-478C-4445-8FF4-4C3D4452B88D",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31099812-DFC5-4205-8D5F-6C8FC5CA71AD",
"versionEndIncluding": "08-01-04",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9D0CAD86-355F-4DBE-A397-A7497533F6EF",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4DA36C31-7753-42E8-8752-9EA286A31D5B",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "73018662-C036-40AB-B85C-6D84FAD4B937",
"versionEndIncluding": "08-12-03",
"versionStartIncluding": "08-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98F6AD56-5D63-4C1A-9B19-0845F5B298FD",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "561DA909-0503-4B1B-B132-E06157EAFD15",
"versionEndIncluding": "08-51-17",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C10FDCBE-17E7-4C05-BD7E-128E5500A461",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A2133302-B6F4-48E0-A3E8-2EF971F4D349",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0012F47A-9F14-4305-A7CB-6A7F09D7224B",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61A24A5E-A62F-4D67-8A17-7E58E6C61C94",
"versionEndIncluding": "09-12-16",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CC78F4B-E608-46F9-941B-9522A5B9106E",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8467AC9A-66C5-4EF1-A430-8B9176ECFEBF",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9057F305-7CAD-4CBE-BE9C-5669831A9FE6",
"versionEndIncluding": "10-10-23",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6BD1AFB9-87CD-4751-8F41-888E7056F256",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B69D310-5149-4986-AFCC-400992F7B14E",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A0218938-33D0-454E-8341-FADEEA90529C",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "13D283D2-6122-492F-A31D-E0C8EBB8D152",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AF19CFBE-D55A-4054-BD5C-2A06590C1A3B",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "773C6952-5080-4DA7-966D-556218293088",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37F23999-9338-4311-8340-ECB08E3F31B2",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE9B8B1E-F13E-4B23-ACFE-877A72576C99",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B65371A-8686-44C9-99BC-111C0DF4C919",
"versionEndIncluding": "09-10-13",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "57BA5BF2-B522-47EB-8A7B-38C08FAFD71D",
"versionEndIncluding": "09-50-19",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "34F0C0B3-EE46-40A3-B3C3-1122173289F9",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D500C8CA-F351-403C-9DD9-B158F83A3EB5",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E99EC517-62E4-44FD-9079-1975ACEE8889",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1F992D-103C-4EE9-AFE2-3B4F204C36E7",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4AE2D087-E798-4446-B570-5A9B44DDA8C5",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0536E8B8-1590-45C1-9D0D-0B99F5D2C248",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3DD3518E-A2BC-45E8-AACF-54E3B7F28394",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA24699-08F2-4DEF-B9CB-9D0BD8977309",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EAC1C287-47F7-42A4-9DC1-3454DF43D11E",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "22525249-56B6-46A9-8ADC-533645E288B9",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F308CDDC-B026-46D7-B23A-DABA40EF65A1",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BE06C8C-7653-400E-B5E2-FCB6B2326ED4",
"versionEndIncluding": "09-12-15",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "23272F34-B271-448C-B631-C4800F716E7B",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E04AA952-315D-475D-B1A9-A66469FE1F9E",
"versionEndIncluding": "10-10-24",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "672D8CDE-47C5-413C-BB2B-FF8388D530F2",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F8998308-E56A-4541-8091-AB8841367C62",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E2F1B409-8698-4CA7-AC96-EAE24FA0CC51",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0C194761-70AB-4032-8751-6517572DFC4F",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7851FE95-219E-4E99-A0D3-C5C96C03DC46",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "84E52AFB-9D8F-4969-A458-177DA4555E67",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7A36817D-2F89-45F5-8045-B3ADBB10B5E4",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "315B8EBE-40DB-4CEE-852C-94DCF5861DC1",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "37C2F07D-C94F-413E-AECA-35226D13D150",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EDB7B46E-A3A7-4082-9495-2687608E9F3A",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F",
"versionEndIncluding": "11-00-02",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0140D278-CB13-4375-AA57-9D57EA82A14D",
"versionEndIncluding": "12-00-011",
"versionStartIncluding": "12-00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
},
{
"lang": "es",
"value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\u00eda ejecutar c\u00f3digo arbitrario en el sistema local"
}
],
"id": "CVE-2021-29645",
"lastModified": "2024-11-21T06:01:33.630",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-12T19:15:07.677",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-29644
Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Severity ?
8.1 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
"versionEndIncluding": "02-50-07",
"versionStartIncluding": "02-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
"versionEndIncluding": "03-00-12",
"versionStartIncluding": "03-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
"versionEndIncluding": "04-00-17",
"versionStartIncluding": "04-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
"versionEndIncluding": "04-50-16",
"versionStartIncluding": "04-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
"versionEndIncluding": "10-01-06",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
"versionEndIncluding": "10-50-11",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
"versionEndIncluding": "08-00-04",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
"versionEndIncluding": "08-10-05",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
"versionEndIncluding": "09-00-07",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
"versionEndIncluding": "09-51-15",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
"versionEndIncluding": "08-00-05",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
"versionEndIncluding": "08-00-07",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
"versionEndIncluding": "08-10-06",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
"versionEndIncluding": "08-51-19",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
"versionEndIncluding": "09-00-09",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
"versionEndIncluding": "09-50-09",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
"versionEndIncluding": "09-51-13",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
"versionEndIncluding": "09-50-03",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
"versionEndIncluding": "09-51-05",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
"versionEndIncluding": "10-00-02",
"versionStartIncluding": "10-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
"versionEndIncluding": "10-01-05",
"versionStartIncluding": "10-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
"versionEndIncluding": "10-02-05",
"versionStartIncluding": "10-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
"versionEndIncluding": "10-10-16",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
"versionEndIncluding": "10-50-12",
"versionStartIncluding": "10-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
"versionEndIncluding": "11-00-11",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
"versionEndIncluding": "11-01-12",
"versionStartIncluding": "11-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
"versionEndIncluding": "11-10-10",
"versionStartIncluding": "11-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
"versionEndIncluding": "11-50-08",
"versionStartIncluding": "11-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
"versionEndIncluding": "11-51-10",
"versionStartIncluding": "11-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
"versionEndIncluding": "12-00-09",
"versionStartIncluding": "12-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
"versionEndIncluding": "12-10-07",
"versionStartIncluding": "12-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
"versionEndIncluding": "12-50-03",
"versionStartIncluding": "12-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "59729765-7E55-4EA4-A36F-41F8C7BA9221",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59",
"versionEndIncluding": "08-01-04",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F81A6FF3-B711-46B6-A747-77F85CAC1FA4",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C59068DB-3EF7-4733-803B-6EBD2786101E",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D36E43A0-E8C0-4423-95EF-A0E19E95ED44",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6",
"versionEndIncluding": "08-12-03",
"versionStartIncluding": "08-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "60604B3B-7BDD-4B19-9CD0-845AACD05588",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD919A5-E1A8-42D8-A911-CB0160F0BB67",
"versionEndIncluding": "08-51-17",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "675C27EE-230F-4731-8F70-CD3EDFD8A338",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F85B6AAD-97DE-44FE-AD5E-142EE6B59F91",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98A61900-9F48-43A8-9EBB-1C63BDD7A11B",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "98C4AF03-3D44-4423-9A0F-D77CE1FB468F",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4",
"versionEndIncluding": "09-12-16",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9344AABE-A55C-466D-8CBA-8E1A856599D9",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5D3A3C28-86B6-4C76-BCDE-CE16522EC02A",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BCC840D4-E8C0-4035-8882-D707454E62D7",
"versionEndIncluding": "10-10-23",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "208B6E96-4B2F-41BD-87C5-FD9FBEF75C84",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36D75DF6-9062-446B-9589-7F9BB1614192",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4FAD30C-105D-415C-B4FC-0AE598584CF1",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDA754AB-E821-4D77-8549-F78AAC28DB80",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "82626BAE-B8F7-4BA5-9888-755CC5966C6B",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "922CD860-52AB-42C3-99FA-4AA1E0BE2534",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "81529DD1-6551-4175-80E6-432B4A95FD0D",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C2505E3A-E0AD-4814-876C-B4FBDB458F0F",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "61719C00-AE97-49E8-AA27-5A18A2DEC234",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B078427F-B51C-4F28-A4F3-EB61FFC66B02",
"versionEndIncluding": "09-10-13",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ADC497C4-1063-4F0F-A23A-49334BF77ECB",
"versionEndIncluding": "09-50-19",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "673B30C5-F863-44D5-9E36-8183BCDB25C1",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
"matchCriteriaId": "01F6D082-AA59-4F7C-A0AC-45016E451469",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F6955554-2A1E-45A2-8C0E-38E87955A11F",
"versionEndIncluding": "08-00-09",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4",
"versionEndIncluding": "08-02-07",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "15C859F1-D44C-4A48-BF30-8CB0D344EEF0",
"versionEndIncluding": "08-10-13",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0911EE99-E8EA-482F-993F-63CA578157F6",
"versionEndIncluding": "08-11-17",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C97FCFAE-5731-483E-9DB1-B15C1F10B292",
"versionEndIncluding": "08-50-08",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0",
"versionEndIncluding": "08-51-18",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93F95B95-3D0D-4B12-B2AF-3FC3C9341232",
"versionEndIncluding": "08-52-22",
"versionStartIncluding": "08-52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "32B3F4C6-32FE-41B8-AB64-F47053D12686",
"versionEndIncluding": "09-00-14",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "795A5DBD-5E00-430F-9556-4D7DD7F26EBA",
"versionEndIncluding": "09-01-14",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9F1F9438-0952-4B83-AA04-B3825D29438D",
"versionEndIncluding": "09-10-15",
"versionStartIncluding": "09-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2",
"versionEndIncluding": "09-12-15",
"versionStartIncluding": "09-12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1E652FA6-D612-458C-BA72-29346A0AC5FB",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF",
"versionEndIncluding": "09-51-14",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "85912BE6-5606-4DF2-B021-DDA9C579C169",
"versionEndIncluding": "10-10-24",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D",
"versionEndIncluding": "08-00-06",
"versionStartIncluding": "08-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1597B309-9C51-48A9-8DC5-DB6ED05EF9CF",
"versionEndIncluding": "08-01-03",
"versionStartIncluding": "08-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "49FBB16A-1FF3-44FF-9023-9E21E9064335",
"versionEndIncluding": "08-02-04",
"versionStartIncluding": "08-02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3FAFA401-1F96-4400-8BF8-F1F1C99DB455",
"versionEndIncluding": "08-10-10",
"versionStartIncluding": "08-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C12ACA7E-7A79-49B4-91BA-BF99105C3C07",
"versionEndIncluding": "08-11-06",
"versionStartIncluding": "08-11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A228B5AB-EDB0-4A36-8414-101B86B19195",
"versionEndIncluding": "08-50-04",
"versionStartIncluding": "08-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E",
"versionEndIncluding": "08-51-14",
"versionStartIncluding": "08-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CA1805D-967E-4048-B3F6-3667274606F4",
"versionEndIncluding": "09-00-13",
"versionStartIncluding": "09-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "69568387-3EA3-4438-852F-CD221C8EF970",
"versionEndIncluding": "09-01-12",
"versionStartIncluding": "09-01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5A622280-D90B-4C00-8F09-4095490867F8",
"versionEndIncluding": "09-50-20",
"versionStartIncluding": "09-50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "35863FFC-1077-44CF-9EE1-E3A29B387976",
"versionEndIncluding": "09-51-08",
"versionStartIncluding": "09-51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB",
"versionEndIncluding": "10-10-20",
"versionStartIncluding": "10-10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA",
"versionEndIncluding": "11-00-02",
"versionStartIncluding": "11-00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D2F87F38-CF16-4F9A-93FE-7355C982ACB1",
"versionEndIncluding": "12-00-01",
"versionStartIncluding": "12-00",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
},
{
"lang": "es",
"value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\u00eda explotar este problema para ejecutar c\u00f3digo con privilegios no restringidos en el sistema operativo subyacente"
}
],
"id": "CVE-2021-29644",
"lastModified": "2024-11-21T06:01:33.450",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 5.9,
"source": "cve@mitre.org",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-10-12T19:15:07.620",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2021-29645 (GCVE-0-2021-29645)
Vulnerability from cvelistv5 – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:30:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29645",
"datePublished": "2021-10-12T18:30:35",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29644 (GCVE-0-2021-29644)
Vulnerability from cvelistv5 – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Severity ?
8.1 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.349Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:19:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29644",
"datePublished": "2021-10-12T18:19:29",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.349Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29645 (GCVE-0-2021-29645)
Vulnerability from nvd – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:30:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29645",
"datePublished": "2021-10-12T18:30:35",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-29644 (GCVE-0-2021-29644)
Vulnerability from nvd – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Severity ?
8.1 (High)
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.349Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:19:29",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29644",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29644",
"datePublished": "2021-10-12T18:19:29",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.349Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}