Search criteria

3 vulnerabilities found for jp1\/remote_control_agent by hitachi

FKIE_CVE-2021-29644

Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
Impacted products
Vendor Product Version
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management_2-manager *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_client-remote_control_feature *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netdm\/dm_manager *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/netm\/remote_control_agent *
hitachi jp1\/remote_control_agent *
hitachi jp1\/remote_control_agent *
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
              "versionEndIncluding": "02-50-07",
              "versionStartIncluding": "02-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
              "versionEndIncluding": "03-00-12",
              "versionStartIncluding": "03-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
              "versionEndIncluding": "04-00-17",
              "versionStartIncluding": "04-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
              "versionEndIncluding": "04-50-16",
              "versionStartIncluding": "04-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
              "versionEndIncluding": "10-01-06",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
              "versionEndIncluding": "10-50-11",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
              "versionEndIncluding": "08-00-04",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
              "versionEndIncluding": "08-10-05",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
              "versionEndIncluding": "09-00-07",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
              "versionEndIncluding": "09-51-15",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
              "versionEndIncluding": "08-00-05",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
              "versionEndIncluding": "08-00-07",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
              "versionEndIncluding": "09-51-05",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
              "versionEndIncluding": "10-00-02",
              "versionStartIncluding": "10-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
              "versionEndIncluding": "10-01-05",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
              "versionEndIncluding": "10-02-05",
              "versionStartIncluding": "10-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
              "versionEndIncluding": "10-50-12",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
              "versionEndIncluding": "11-00-11",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59729765-7E55-4EA4-A36F-41F8C7BA9221",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59",
              "versionEndIncluding": "08-01-04",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F81A6FF3-B711-46B6-A747-77F85CAC1FA4",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C59068DB-3EF7-4733-803B-6EBD2786101E",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36E43A0-E8C0-4423-95EF-A0E19E95ED44",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6",
              "versionEndIncluding": "08-12-03",
              "versionStartIncluding": "08-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "60604B3B-7BDD-4B19-9CD0-845AACD05588",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD919A5-E1A8-42D8-A911-CB0160F0BB67",
              "versionEndIncluding": "08-51-17",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "675C27EE-230F-4731-8F70-CD3EDFD8A338",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F85B6AAD-97DE-44FE-AD5E-142EE6B59F91",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A61900-9F48-43A8-9EBB-1C63BDD7A11B",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98C4AF03-3D44-4423-9A0F-D77CE1FB468F",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4",
              "versionEndIncluding": "09-12-16",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9344AABE-A55C-466D-8CBA-8E1A856599D9",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3A3C28-86B6-4C76-BCDE-CE16522EC02A",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BCC840D4-E8C0-4035-8882-D707454E62D7",
              "versionEndIncluding": "10-10-23",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "208B6E96-4B2F-41BD-87C5-FD9FBEF75C84",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36D75DF6-9062-446B-9589-7F9BB1614192",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4FAD30C-105D-415C-B4FC-0AE598584CF1",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDA754AB-E821-4D77-8549-F78AAC28DB80",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82626BAE-B8F7-4BA5-9888-755CC5966C6B",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "922CD860-52AB-42C3-99FA-4AA1E0BE2534",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81529DD1-6551-4175-80E6-432B4A95FD0D",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2505E3A-E0AD-4814-876C-B4FBDB458F0F",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61719C00-AE97-49E8-AA27-5A18A2DEC234",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B078427F-B51C-4F28-A4F3-EB61FFC66B02",
              "versionEndIncluding": "09-10-13",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADC497C4-1063-4F0F-A23A-49334BF77ECB",
              "versionEndIncluding": "09-50-19",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "673B30C5-F863-44D5-9E36-8183BCDB25C1",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F6D082-AA59-4F7C-A0AC-45016E451469",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6955554-2A1E-45A2-8C0E-38E87955A11F",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15C859F1-D44C-4A48-BF30-8CB0D344EEF0",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0911EE99-E8EA-482F-993F-63CA578157F6",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C97FCFAE-5731-483E-9DB1-B15C1F10B292",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "93F95B95-3D0D-4B12-B2AF-3FC3C9341232",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B3F4C6-32FE-41B8-AB64-F47053D12686",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "795A5DBD-5E00-430F-9556-4D7DD7F26EBA",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F1F9438-0952-4B83-AA04-B3825D29438D",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2",
              "versionEndIncluding": "09-12-15",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E652FA6-D612-458C-BA72-29346A0AC5FB",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netdm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85912BE6-5606-4DF2-B021-DDA9C579C169",
              "versionEndIncluding": "10-10-24",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1597B309-9C51-48A9-8DC5-DB6ED05EF9CF",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FBB16A-1FF3-44FF-9023-9E21E9064335",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FAFA401-1F96-4400-8BF8-F1F1C99DB455",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C12ACA7E-7A79-49B4-91BA-BF99105C3C07",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A228B5AB-EDB0-4A36-8414-101B86B19195",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CA1805D-967E-4048-B3F6-3667274606F4",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69568387-3EA3-4438-852F-CD221C8EF970",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A622280-D90B-4C00-8F09-4095490867F8",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35863FFC-1077-44CF-9EE1-E3A29B387976",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA",
              "versionEndIncluding": "11-00-02",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2F87F38-CF16-4F9A-93FE-7355C982ACB1",
              "versionEndIncluding": "12-00-01",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
    },
    {
      "lang": "es",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\u00eda explotar este problema para ejecutar c\u00f3digo con privilegios no restringidos en el sistema operativo subyacente"
    }
  ],
  "id": "CVE-2021-29644",
  "lastModified": "2024-11-21T06:01:33.450",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.1,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-12T19:15:07.620",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-190"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-29644 (GCVE-0-2021-29644)

Vulnerability from cvelistv5 – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.349Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:19:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29644",
    "datePublished": "2021-10-12T18:19:29",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-29644 (GCVE-0-2021-29644)

Vulnerability from nvd – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.349Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:19:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29644",
    "datePublished": "2021-10-12T18:19:29",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}