Search criteria

3 vulnerabilities found for jp1\/remote_control_feature by hitachi

FKIE_CVE-2021-29645

Vulnerability from fkie_nvd - Published: 2021-10-12 19:15 - Updated: 2024-11-21 06:01
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Impacted products
Vendor Product Version
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi it_operations_director *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management-manager *
hitachi job_management_partner_1\/it_desktop_management_2-manager *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/remote_control_agent *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_client *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi job_management_partner_1\/software_distribution_manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-manager *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/it_desktop_management_2-operations_director *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_client-remote_control_feature *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/dm_manager *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/netm\/remote_control_feature *
hitachi jp1\/remote_control_feature *
hitachi jp1\/remote_control_feature *
microsoft windows -

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31A6D122-6529-4CD7-83F1-890BAAD30C9D",
              "versionEndIncluding": "02-50-07",
              "versionStartIncluding": "02-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84C240B-B22A-4807-B45E-A2785FA8AA12",
              "versionEndIncluding": "03-00-12",
              "versionStartIncluding": "03-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "708AC60B-61B2-4815-AF92-8FC22A57BAA5",
              "versionEndIncluding": "04-00-17",
              "versionStartIncluding": "04-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C01FBB-9E1C-41B0-9ABE-DDA2990709FC",
              "versionEndIncluding": "04-50-16",
              "versionStartIncluding": "04-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92C9B7F0-5605-4CF4-9394-7C5CBF447341",
              "versionEndIncluding": "10-01-06",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A",
              "versionEndIncluding": "10-50-11",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4B7DD39-855D-4B3D-B452-321E2E22E006",
              "versionEndIncluding": "08-00-04",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D151B64-9A48-4B94-B275-1BEC48BF27A3",
              "versionEndIncluding": "08-10-05",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "990B0997-6841-48CC-9546-4EFA60CFCA81",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FED75E6-0EEC-4931-91D8-4243061CCB4D",
              "versionEndIncluding": "09-00-07",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECF36556-471D-4834-8436-8FEF37ED8D36",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/remote_control_agent:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB",
              "versionEndIncluding": "09-51-15",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BCD7221-2A96-4B3D-A10B-D73287474298",
              "versionEndIncluding": "08-00-05",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9339148D-F498-468E-BE3E-1F80C89EC11B",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "136167A6-3EF7-4A1C-86BE-B832CE215236",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "776952E7-1A18-4BC8-B966-07A53CE790BC",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C369C0F6-902F-4268-B354-9653836C06C4",
              "versionEndIncluding": "08-00-07",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAF3001-BAC1-47BC-94C1-0B17CB5F894F",
              "versionEndIncluding": "08-10-06",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD",
              "versionEndIncluding": "08-51-19",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B36991F6-3AA7-47F9-8E1C-80A57FD8AB34",
              "versionEndIncluding": "09-00-09",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "431C9492-8992-4744-8BAA-48369B169186",
              "versionEndIncluding": "09-50-09",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:job_management_partner_1\\/software_distribution_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4",
              "versionEndIncluding": "09-51-13",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1AA3676-A96A-4B48-B7E4-DAD57AFA9934",
              "versionEndIncluding": "09-50-03",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8CF0981-4417-4C0F-A085-F0AF8E7A94FF",
              "versionEndIncluding": "09-51-05",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51AADEA3-240A-4841-931C-3D85937EDC53",
              "versionEndIncluding": "10-00-02",
              "versionStartIncluding": "10-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A1E153-4E63-4B59-B4EA-0A553FA084CF",
              "versionEndIncluding": "10-01-05",
              "versionStartIncluding": "10-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "525F9923-07A4-43A0-890E-CB353D0E04E4",
              "versionEndIncluding": "10-02-05",
              "versionStartIncluding": "10-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27F62337-69A8-42C1-A089-1A102CC59B37",
              "versionEndIncluding": "10-10-16",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BA040ED-71DA-49EA-8B25-09240A64D428",
              "versionEndIncluding": "10-50-12",
              "versionStartIncluding": "10-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9C8AA35-7F59-447A-A0CD-1DF8C6292F30",
              "versionEndIncluding": "11-00-11",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2243155A-E21E-483F-B121-AC011760C665",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F1C470-34BD-4929-9E3C-908153D88527",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "707FC4B6-AA33-46D1-928F-B9A7EAD31841",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25F48D5A-79A2-4396-8F67-CF1732449575",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9596730E-5CCB-499D-B13E-D274A3D0FD9D",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F419ADC2-EB1E-4977-93A0-EDE6FA64FC90",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC4AB47E-8E26-46FC-A5FA-7113149CB0D4",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "504B2990-0F85-46E6-8F00-AB501BC413B7",
              "versionEndIncluding": "11-01-12",
              "versionStartIncluding": "11-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "647CD056-0A30-405C-9A45-7666E076E287",
              "versionEndIncluding": "11-10-10",
              "versionStartIncluding": "11-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F03002F-CB77-48D0-A2BF-986532E097AB",
              "versionEndIncluding": "11-50-08",
              "versionStartIncluding": "11-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A77A383-D5DA-450E-8472-920DD58343D4",
              "versionEndIncluding": "11-51-10",
              "versionStartIncluding": "11-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE2A1932-6B77-4D3B-AF72-3B6105F92F4E",
              "versionEndIncluding": "12-00-09",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA",
              "versionEndIncluding": "12-10-07",
              "versionStartIncluding": "12-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8",
              "versionEndIncluding": "12-50-03",
              "versionStartIncluding": "12-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BC313F8-478C-4445-8FF4-4C3D4452B88D",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "31099812-DFC5-4205-8D5F-6C8FC5CA71AD",
              "versionEndIncluding": "08-01-04",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9D0CAD86-355F-4DBE-A397-A7497533F6EF",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DA36C31-7753-42E8-8752-9EA286A31D5B",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73018662-C036-40AB-B85C-6D84FAD4B937",
              "versionEndIncluding": "08-12-03",
              "versionStartIncluding": "08-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98F6AD56-5D63-4C1A-9B19-0845F5B298FD",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "561DA909-0503-4B1B-B132-E06157EAFD15",
              "versionEndIncluding": "08-51-17",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10FDCBE-17E7-4C05-BD7E-128E5500A461",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2133302-B6F4-48E0-A3E8-2EF971F4D349",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0012F47A-9F14-4305-A7CB-6A7F09D7224B",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61A24A5E-A62F-4D67-8A17-7E58E6C61C94",
              "versionEndIncluding": "09-12-16",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC78F4B-E608-46F9-941B-9522A5B9106E",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8467AC9A-66C5-4EF1-A430-8B9176ECFEBF",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9057F305-7CAD-4CBE-BE9C-5669831A9FE6",
              "versionEndIncluding": "10-10-23",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BD1AFB9-87CD-4751-8F41-888E7056F256",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B69D310-5149-4986-AFCC-400992F7B14E",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0218938-33D0-454E-8341-FADEEA90529C",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13D283D2-6122-492F-A31D-E0C8EBB8D152",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF19CFBE-D55A-4054-BD5C-2A06590C1A3B",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "773C6952-5080-4DA7-966D-556218293088",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F23999-9338-4311-8340-ECB08E3F31B2",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE9B8B1E-F13E-4B23-ACFE-877A72576C99",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B65371A-8686-44C9-99BC-111C0DF4C919",
              "versionEndIncluding": "09-10-13",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57BA5BF2-B522-47EB-8A7B-38C08FAFD71D",
              "versionEndIncluding": "09-50-19",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F0C0B3-EE46-40A3-B3C3-1122173289F9",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D500C8CA-F351-403C-9DD9-B158F83A3EB5",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E99EC517-62E4-44FD-9079-1975ACEE8889",
              "versionEndIncluding": "08-00-09",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED1F992D-103C-4EE9-AFE2-3B4F204C36E7",
              "versionEndIncluding": "08-02-07",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2",
              "versionEndIncluding": "08-10-13",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AE2D087-E798-4446-B570-5A9B44DDA8C5",
              "versionEndIncluding": "08-11-17",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0536E8B8-1590-45C1-9D0D-0B99F5D2C248",
              "versionEndIncluding": "08-50-08",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DD3518E-A2BC-45E8-AACF-54E3B7F28394",
              "versionEndIncluding": "08-51-18",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAA24699-08F2-4DEF-B9CB-9D0BD8977309",
              "versionEndIncluding": "08-52-22",
              "versionStartIncluding": "08-52",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAC1C287-47F7-42A4-9DC1-3454DF43D11E",
              "versionEndIncluding": "09-00-14",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "22525249-56B6-46A9-8ADC-533645E288B9",
              "versionEndIncluding": "09-01-14",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F308CDDC-B026-46D7-B23A-DABA40EF65A1",
              "versionEndIncluding": "09-10-15",
              "versionStartIncluding": "09-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE06C8C-7653-400E-B5E2-FCB6B2326ED4",
              "versionEndIncluding": "09-12-15",
              "versionStartIncluding": "09-12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23272F34-B271-448C-B631-C4800F716E7B",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01",
              "versionEndIncluding": "09-51-14",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/dm_manager:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E04AA952-315D-475D-B1A9-A66469FE1F9E",
              "versionEndIncluding": "10-10-24",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "672D8CDE-47C5-413C-BB2B-FF8388D530F2",
              "versionEndIncluding": "08-00-06",
              "versionStartIncluding": "08-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F",
              "versionEndIncluding": "08-01-03",
              "versionStartIncluding": "08-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8998308-E56A-4541-8091-AB8841367C62",
              "versionEndIncluding": "08-02-04",
              "versionStartIncluding": "08-02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2F1B409-8698-4CA7-AC96-EAE24FA0CC51",
              "versionEndIncluding": "08-10-10",
              "versionStartIncluding": "08-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C194761-70AB-4032-8751-6517572DFC4F",
              "versionEndIncluding": "08-11-06",
              "versionStartIncluding": "08-11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7851FE95-219E-4E99-A0D3-C5C96C03DC46",
              "versionEndIncluding": "08-50-04",
              "versionStartIncluding": "08-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84E52AFB-9D8F-4969-A458-177DA4555E67",
              "versionEndIncluding": "08-51-14",
              "versionStartIncluding": "08-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71",
              "versionEndIncluding": "09-00-13",
              "versionStartIncluding": "09-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A36817D-2F89-45F5-8045-B3ADBB10B5E4",
              "versionEndIncluding": "09-01-12",
              "versionStartIncluding": "09-01",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "315B8EBE-40DB-4CEE-852C-94DCF5861DC1",
              "versionEndIncluding": "09-50-20",
              "versionStartIncluding": "09-50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37C2F07D-C94F-413E-AECA-35226D13D150",
              "versionEndIncluding": "09-51-08",
              "versionStartIncluding": "09-51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/netm\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB7B46E-A3A7-4082-9495-2687608E9F3A",
              "versionEndIncluding": "10-10-20",
              "versionStartIncluding": "10-10",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F",
              "versionEndIncluding": "11-00-02",
              "versionStartIncluding": "11-00",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hitachi:jp1\\/remote_control_feature:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0140D278-CB13-4375-AA57-9D57EA82A14D",
              "versionEndIncluding": "12-00-011",
              "versionStartIncluding": "12-00",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
    },
    {
      "lang": "es",
      "value": "Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\u00eda ejecutar c\u00f3digo arbitrario en el sistema local"
    }
  ],
  "id": "CVE-2021-29645",
  "lastModified": "2024-11-21T06:01:33.630",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "cve@mitre.org",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-10-12T19:15:07.677",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.hitachi.com/hirt/security/index.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2021-29645 (GCVE-0-2021-29645)

Vulnerability from cvelistv5 – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:30:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29645",
    "datePublished": "2021-10-12T18:30:35",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-29645 (GCVE-0-2021-29645)

Vulnerability from nvd – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:30:35",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29645",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29645",
    "datePublished": "2021-10-12T18:30:35",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}