CVE-2021-29644 (GCVE-0-2021-29644)

Vulnerability from cvelistv5 – Published: 2021-10-12 18:19 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:11:06.349Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.hitachi.com/hirt/security/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-10-12T18:19:29",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.hitachi.com/hirt/security/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2021-29644",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS."
            }
          ]
        },
        "impact": {
          "cvss": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AC:H/AV:N/A:H/C:H/I:H/PR:N/S:U/UI:N",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.hitachi.com/hirt/security/index.html",
              "refsource": "MISC",
              "url": "https://www.hitachi.com/hirt/security/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2021-29644",
    "datePublished": "2021-10-12T18:19:29",
    "dateReserved": "2021-03-30T00:00:00",
    "dateUpdated": "2024-08-03T22:11:06.349Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"02-50\", \"versionEndIncluding\": \"02-50-07\", \"matchCriteriaId\": \"31A6D122-6529-4CD7-83F1-890BAAD30C9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"03-00\", \"versionEndIncluding\": \"03-00-12\", \"matchCriteriaId\": \"B84C240B-B22A-4807-B45E-A2785FA8AA12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"04-00\", \"versionEndIncluding\": \"04-00-17\", \"matchCriteriaId\": \"708AC60B-61B2-4815-AF92-8FC22A57BAA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"04-50\", \"versionEndIncluding\": \"04-50-16\", \"matchCriteriaId\": \"74C01FBB-9E1C-41B0-9ABE-DDA2990709FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-03\", \"matchCriteriaId\": \"10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-01\", \"versionEndIncluding\": \"10-01-06\", \"matchCriteriaId\": \"92C9B7F0-5605-4CF4-9394-7C5CBF447341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-16\", \"matchCriteriaId\": \"AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-50\", \"versionEndIncluding\": \"10-50-11\", \"matchCriteriaId\": \"FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-04\", \"matchCriteriaId\": \"A4B7DD39-855D-4B3D-B452-321E2E22E006\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-05\", \"matchCriteriaId\": \"3D151B64-9A48-4B94-B275-1BEC48BF27A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-18\", \"matchCriteriaId\": \"990B0997-6841-48CC-9546-4EFA60CFCA81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-07\", \"matchCriteriaId\": \"5FED75E6-0EEC-4931-91D8-4243061CCB4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"ECF36556-471D-4834-8436-8FEF37ED8D36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-15\", \"matchCriteriaId\": \"0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-05\", \"matchCriteriaId\": \"9BCD7221-2A96-4B3D-A10B-D73287474298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-06\", \"matchCriteriaId\": \"9339148D-F498-468E-BE3E-1F80C89EC11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-19\", \"matchCriteriaId\": \"F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-09\", \"matchCriteriaId\": \"8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"136167A6-3EF7-4A1C-86BE-B832CE215236\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-13\", \"matchCriteriaId\": \"776952E7-1A18-4BC8-B966-07A53CE790BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-07\", \"matchCriteriaId\": \"C369C0F6-902F-4268-B354-9653836C06C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-06\", \"matchCriteriaId\": \"6CAF3001-BAC1-47BC-94C1-0B17CB5F894F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-19\", \"matchCriteriaId\": \"397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-09\", \"matchCriteriaId\": \"B36991F6-3AA7-47F9-8E1C-80A57FD8AB34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"431C9492-8992-4744-8BAA-48369B169186\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-13\", \"matchCriteriaId\": \"D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-03\", \"matchCriteriaId\": \"A1AA3676-A96A-4B48-B7E4-DAD57AFA9934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-05\", \"matchCriteriaId\": \"A8CF0981-4417-4C0F-A085-F0AF8E7A94FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-00\", \"versionEndIncluding\": \"10-00-02\", \"matchCriteriaId\": \"51AADEA3-240A-4841-931C-3D85937EDC53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-01\", \"versionEndIncluding\": \"10-01-05\", \"matchCriteriaId\": \"A1A1E153-4E63-4B59-B4EA-0A553FA084CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-02\", \"versionEndIncluding\": \"10-02-05\", \"matchCriteriaId\": \"525F9923-07A4-43A0-890E-CB353D0E04E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-16\", \"matchCriteriaId\": \"27F62337-69A8-42C1-A089-1A102CC59B37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-50\", \"versionEndIncluding\": \"10-50-12\", \"matchCriteriaId\": \"4BA040ED-71DA-49EA-8B25-09240A64D428\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-00\", \"versionEndIncluding\": \"11-00-11\", \"matchCriteriaId\": \"F9C8AA35-7F59-447A-A0CD-1DF8C6292F30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-01\", \"versionEndIncluding\": \"11-01-12\", \"matchCriteriaId\": \"2243155A-E21E-483F-B121-AC011760C665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-10\", \"versionEndIncluding\": \"11-10-10\", \"matchCriteriaId\": \"B1F1C470-34BD-4929-9E3C-908153D88527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-50\", \"versionEndIncluding\": \"11-50-08\", \"matchCriteriaId\": \"707FC4B6-AA33-46D1-928F-B9A7EAD31841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-51\", \"versionEndIncluding\": \"11-51-10\", \"matchCriteriaId\": \"25F48D5A-79A2-4396-8F67-CF1732449575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-09\", \"matchCriteriaId\": \"9596730E-5CCB-499D-B13E-D274A3D0FD9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-10\", \"versionEndIncluding\": \"12-10-07\", \"matchCriteriaId\": \"F419ADC2-EB1E-4977-93A0-EDE6FA64FC90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-50\", \"versionEndIncluding\": \"12-50-03\", \"matchCriteriaId\": \"DC4AB47E-8E26-46FC-A5FA-7113149CB0D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-01\", \"versionEndIncluding\": \"11-01-12\", \"matchCriteriaId\": \"504B2990-0F85-46E6-8F00-AB501BC413B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-10\", \"versionEndIncluding\": \"11-10-10\", \"matchCriteriaId\": \"647CD056-0A30-405C-9A45-7666E076E287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-50\", \"versionEndIncluding\": \"11-50-08\", \"matchCriteriaId\": \"5F03002F-CB77-48D0-A2BF-986532E097AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-51\", \"versionEndIncluding\": \"11-51-10\", \"matchCriteriaId\": \"5A77A383-D5DA-450E-8472-920DD58343D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-09\", \"matchCriteriaId\": \"EE2A1932-6B77-4D3B-AF72-3B6105F92F4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-10\", \"versionEndIncluding\": \"12-10-07\", \"matchCriteriaId\": \"2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-50\", \"versionEndIncluding\": \"12-50-03\", \"matchCriteriaId\": \"6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-09\", \"matchCriteriaId\": \"59729765-7E55-4EA4-A36F-41F8C7BA9221\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-04\", \"matchCriteriaId\": \"1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-07\", \"matchCriteriaId\": \"F81A6FF3-B711-46B6-A747-77F85CAC1FA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-13\", \"matchCriteriaId\": \"C59068DB-3EF7-4733-803B-6EBD2786101E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-17\", \"matchCriteriaId\": \"D36E43A0-E8C0-4423-95EF-A0E19E95ED44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-12\", \"versionEndIncluding\": \"08-12-03\", \"matchCriteriaId\": \"CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-08\", \"matchCriteriaId\": \"60604B3B-7BDD-4B19-9CD0-845AACD05588\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-17\", \"matchCriteriaId\": \"3FD919A5-E1A8-42D8-A911-CB0160F0BB67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-52\", \"versionEndIncluding\": \"08-52-22\", \"matchCriteriaId\": \"675C27EE-230F-4731-8F70-CD3EDFD8A338\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-14\", \"matchCriteriaId\": \"F85B6AAD-97DE-44FE-AD5E-142EE6B59F91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-14\", \"matchCriteriaId\": \"98A61900-9F48-43A8-9EBB-1C63BDD7A11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-15\", \"matchCriteriaId\": \"98C4AF03-3D44-4423-9A0F-D77CE1FB468F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-12\", \"versionEndIncluding\": \"09-12-16\", \"matchCriteriaId\": \"A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"9344AABE-A55C-466D-8CBA-8E1A856599D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-14\", \"matchCriteriaId\": \"5D3A3C28-86B6-4C76-BCDE-CE16522EC02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-23\", \"matchCriteriaId\": \"BCC840D4-E8C0-4035-8882-D707454E62D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-06\", \"matchCriteriaId\": \"208B6E96-4B2F-41BD-87C5-FD9FBEF75C84\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-03\", \"matchCriteriaId\": \"36D75DF6-9062-446B-9589-7F9BB1614192\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-04\", \"matchCriteriaId\": \"C4FAD30C-105D-415C-B4FC-0AE598584CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-10\", \"matchCriteriaId\": \"BDA754AB-E821-4D77-8549-F78AAC28DB80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-06\", \"matchCriteriaId\": \"82626BAE-B8F7-4BA5-9888-755CC5966C6B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-04\", \"matchCriteriaId\": \"922CD860-52AB-42C3-99FA-4AA1E0BE2534\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-14\", \"matchCriteriaId\": \"81529DD1-6551-4175-80E6-432B4A95FD0D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-13\", \"matchCriteriaId\": \"C2505E3A-E0AD-4814-876C-B4FBDB458F0F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-12\", \"matchCriteriaId\": \"61719C00-AE97-49E8-AA27-5A18A2DEC234\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-13\", \"matchCriteriaId\": \"B078427F-B51C-4F28-A4F3-EB61FFC66B02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-19\", \"matchCriteriaId\": \"ADC497C4-1063-4F0F-A23A-49334BF77ECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-08\", \"matchCriteriaId\": \"673B30C5-F863-44D5-9E36-8183BCDB25C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-20\", \"matchCriteriaId\": \"01F6D082-AA59-4F7C-A0AC-45016E451469\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-09\", \"matchCriteriaId\": \"F6955554-2A1E-45A2-8C0E-38E87955A11F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-07\", \"matchCriteriaId\": \"0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-13\", \"matchCriteriaId\": \"15C859F1-D44C-4A48-BF30-8CB0D344EEF0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-17\", \"matchCriteriaId\": \"0911EE99-E8EA-482F-993F-63CA578157F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-08\", \"matchCriteriaId\": \"C97FCFAE-5731-483E-9DB1-B15C1F10B292\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-18\", \"matchCriteriaId\": \"10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-52\", \"versionEndIncluding\": \"08-52-22\", \"matchCriteriaId\": \"93F95B95-3D0D-4B12-B2AF-3FC3C9341232\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-14\", \"matchCriteriaId\": \"32B3F4C6-32FE-41B8-AB64-F47053D12686\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-14\", \"matchCriteriaId\": \"795A5DBD-5E00-430F-9556-4D7DD7F26EBA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-15\", \"matchCriteriaId\": \"9F1F9438-0952-4B83-AA04-B3825D29438D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-12\", \"versionEndIncluding\": \"09-12-15\", \"matchCriteriaId\": \"C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"1E652FA6-D612-458C-BA72-29346A0AC5FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-14\", \"matchCriteriaId\": \"DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-24\", \"matchCriteriaId\": \"85912BE6-5606-4DF2-B021-DDA9C579C169\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-06\", \"matchCriteriaId\": \"3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-03\", \"matchCriteriaId\": \"1597B309-9C51-48A9-8DC5-DB6ED05EF9CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-04\", \"matchCriteriaId\": \"49FBB16A-1FF3-44FF-9023-9E21E9064335\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-10\", \"matchCriteriaId\": \"3FAFA401-1F96-4400-8BF8-F1F1C99DB455\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-06\", \"matchCriteriaId\": \"C12ACA7E-7A79-49B4-91BA-BF99105C3C07\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-04\", \"matchCriteriaId\": \"A228B5AB-EDB0-4A36-8414-101B86B19195\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-14\", \"matchCriteriaId\": \"0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-13\", \"matchCriteriaId\": \"3CA1805D-967E-4048-B3F6-3667274606F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-12\", \"matchCriteriaId\": \"69568387-3EA3-4438-852F-CD221C8EF970\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"5A622280-D90B-4C00-8F09-4095490867F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-08\", \"matchCriteriaId\": \"35863FFC-1077-44CF-9EE1-E3A29B387976\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-20\", \"matchCriteriaId\": \"DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-00\", \"versionEndIncluding\": \"11-00-02\", \"matchCriteriaId\": \"5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-01\", \"matchCriteriaId\": \"D2F87F38-CF16-4F9A-93FE-7355C982ACB1\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.\"}, {\"lang\": \"es\", \"value\": \"Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\\u00f3n de c\\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\\u00eda explotar este problema para ejecutar c\\u00f3digo con privilegios no restringidos en el sistema operativo subyacente\"}]",
      "id": "CVE-2021-29644",
      "lastModified": "2024-11-21T06:01:33.450",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.2, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 10.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-10-12T19:15:07.620",
      "references": "[{\"url\": \"https://www.hitachi.com/hirt/security/index.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.hitachi.com/hirt/security/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-190\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-29644\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-12T19:15:07.620\",\"lastModified\":\"2024-11-21T06:01:33.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 contains a remote code execution vulnerability because of an Integer Overflow. An attacker with network access to port 31016 may exploit this issue to execute code with unrestricted privileges on the underlying OS.\"},{\"lang\":\"es\",\"value\":\"Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, contienen una vulnerabilidad de ejecuci\u00f3n de c\u00f3digo remota debido a un desbordamiento de enteros. Un atacante con acceso de red al puerto 31016 podr\u00eda explotar este problema para ejecutar c\u00f3digo con privilegios no restringidos en el sistema operativo subyacente\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.2,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-190\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"02-50\",\"versionEndIncluding\":\"02-50-07\",\"matchCriteriaId\":\"31A6D122-6529-4CD7-83F1-890BAAD30C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"03-00\",\"versionEndIncluding\":\"03-00-12\",\"matchCriteriaId\":\"B84C240B-B22A-4807-B45E-A2785FA8AA12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"04-00\",\"versionEndIncluding\":\"04-00-17\",\"matchCriteriaId\":\"708AC60B-61B2-4815-AF92-8FC22A57BAA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"04-50\",\"versionEndIncluding\":\"04-50-16\",\"matchCriteriaId\":\"74C01FBB-9E1C-41B0-9ABE-DDA2990709FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-03\",\"matchCriteriaId\":\"10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-01\",\"versionEndIncluding\":\"10-01-06\",\"matchCriteriaId\":\"92C9B7F0-5605-4CF4-9394-7C5CBF447341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-16\",\"matchCriteriaId\":\"AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-11\",\"matchCriteriaId\":\"FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-04\",\"matchCriteriaId\":\"A4B7DD39-855D-4B3D-B452-321E2E22E006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-05\",\"matchCriteriaId\":\"3D151B64-9A48-4B94-B275-1BEC48BF27A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-18\",\"matchCriteriaId\":\"990B0997-6841-48CC-9546-4EFA60CFCA81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-07\",\"matchCriteriaId\":\"5FED75E6-0EEC-4931-91D8-4243061CCB4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"ECF36556-471D-4834-8436-8FEF37ED8D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-15\",\"matchCriteriaId\":\"0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-05\",\"matchCriteriaId\":\"9BCD7221-2A96-4B3D-A10B-D73287474298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-06\",\"matchCriteriaId\":\"9339148D-F498-468E-BE3E-1F80C89EC11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-19\",\"matchCriteriaId\":\"F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-09\",\"matchCriteriaId\":\"8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"136167A6-3EF7-4A1C-86BE-B832CE215236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-13\",\"matchCriteriaId\":\"776952E7-1A18-4BC8-B966-07A53CE790BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-07\",\"matchCriteriaId\":\"C369C0F6-902F-4268-B354-9653836C06C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-06\",\"matchCriteriaId\":\"6CAF3001-BAC1-47BC-94C1-0B17CB5F894F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-19\",\"matchCriteriaId\":\"397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-09\",\"matchCriteriaId\":\"B36991F6-3AA7-47F9-8E1C-80A57FD8AB34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"431C9492-8992-4744-8BAA-48369B169186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-13\",\"matchCriteriaId\":\"D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-03\",\"matchCriteriaId\":\"A1AA3676-A96A-4B48-B7E4-DAD57AFA9934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-05\",\"matchCriteriaId\":\"A8CF0981-4417-4C0F-A085-F0AF8E7A94FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-00\",\"versionEndIncluding\":\"10-00-02\",\"matchCriteriaId\":\"51AADEA3-240A-4841-931C-3D85937EDC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-01\",\"versionEndIncluding\":\"10-01-05\",\"matchCriteriaId\":\"A1A1E153-4E63-4B59-B4EA-0A553FA084CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-02\",\"versionEndIncluding\":\"10-02-05\",\"matchCriteriaId\":\"525F9923-07A4-43A0-890E-CB353D0E04E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-16\",\"matchCriteriaId\":\"27F62337-69A8-42C1-A089-1A102CC59B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-12\",\"matchCriteriaId\":\"4BA040ED-71DA-49EA-8B25-09240A64D428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-11\",\"matchCriteriaId\":\"F9C8AA35-7F59-447A-A0CD-1DF8C6292F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"2243155A-E21E-483F-B121-AC011760C665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"B1F1C470-34BD-4929-9E3C-908153D88527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"707FC4B6-AA33-46D1-928F-B9A7EAD31841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"25F48D5A-79A2-4396-8F67-CF1732449575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"9596730E-5CCB-499D-B13E-D274A3D0FD9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-07\",\"matchCriteriaId\":\"F419ADC2-EB1E-4977-93A0-EDE6FA64FC90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-03\",\"matchCriteriaId\":\"DC4AB47E-8E26-46FC-A5FA-7113149CB0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"504B2990-0F85-46E6-8F00-AB501BC413B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"647CD056-0A30-405C-9A45-7666E076E287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"5F03002F-CB77-48D0-A2BF-986532E097AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"5A77A383-D5DA-450E-8472-920DD58343D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"EE2A1932-6B77-4D3B-AF72-3B6105F92F4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-07\",\"matchCriteriaId\":\"2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-03\",\"matchCriteriaId\":\"6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-09\",\"matchCriteriaId\":\"59729765-7E55-4EA4-A36F-41F8C7BA9221\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-04\",\"matchCriteriaId\":\"1F3378BE-1C1D-4C29-8D5F-EBDA709C2A59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-07\",\"matchCriteriaId\":\"F81A6FF3-B711-46B6-A747-77F85CAC1FA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-13\",\"matchCriteriaId\":\"C59068DB-3EF7-4733-803B-6EBD2786101E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-17\",\"matchCriteriaId\":\"D36E43A0-E8C0-4423-95EF-A0E19E95ED44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-12\",\"versionEndIncluding\":\"08-12-03\",\"matchCriteriaId\":\"CED5BF7A-A8D1-4E26-B7ED-0A2968C49CE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-08\",\"matchCriteriaId\":\"60604B3B-7BDD-4B19-9CD0-845AACD05588\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-17\",\"matchCriteriaId\":\"3FD919A5-E1A8-42D8-A911-CB0160F0BB67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-52\",\"versionEndIncluding\":\"08-52-22\",\"matchCriteriaId\":\"675C27EE-230F-4731-8F70-CD3EDFD8A338\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"F85B6AAD-97DE-44FE-AD5E-142EE6B59F91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"98A61900-9F48-43A8-9EBB-1C63BDD7A11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"98C4AF03-3D44-4423-9A0F-D77CE1FB468F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-16\",\"matchCriteriaId\":\"A7ACF92E-A7C3-48DA-8558-FB4B12B2A2E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"9344AABE-A55C-466D-8CBA-8E1A856599D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"5D3A3C28-86B6-4C76-BCDE-CE16522EC02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-23\",\"matchCriteriaId\":\"BCC840D4-E8C0-4035-8882-D707454E62D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-06\",\"matchCriteriaId\":\"208B6E96-4B2F-41BD-87C5-FD9FBEF75C84\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-03\",\"matchCriteriaId\":\"36D75DF6-9062-446B-9589-7F9BB1614192\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-04\",\"matchCriteriaId\":\"C4FAD30C-105D-415C-B4FC-0AE598584CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-10\",\"matchCriteriaId\":\"BDA754AB-E821-4D77-8549-F78AAC28DB80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-06\",\"matchCriteriaId\":\"82626BAE-B8F7-4BA5-9888-755CC5966C6B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-04\",\"matchCriteriaId\":\"922CD860-52AB-42C3-99FA-4AA1E0BE2534\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-14\",\"matchCriteriaId\":\"81529DD1-6551-4175-80E6-432B4A95FD0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-13\",\"matchCriteriaId\":\"C2505E3A-E0AD-4814-876C-B4FBDB458F0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-12\",\"matchCriteriaId\":\"61719C00-AE97-49E8-AA27-5A18A2DEC234\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-13\",\"matchCriteriaId\":\"B078427F-B51C-4F28-A4F3-EB61FFC66B02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-19\",\"matchCriteriaId\":\"ADC497C4-1063-4F0F-A23A-49334BF77ECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-08\",\"matchCriteriaId\":\"673B30C5-F863-44D5-9E36-8183BCDB25C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-20\",\"matchCriteriaId\":\"01F6D082-AA59-4F7C-A0AC-45016E451469\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-09\",\"matchCriteriaId\":\"F6955554-2A1E-45A2-8C0E-38E87955A11F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-07\",\"matchCriteriaId\":\"0FC0BDE2-94C7-4A18-AFED-AA12D1B8FDA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-13\",\"matchCriteriaId\":\"15C859F1-D44C-4A48-BF30-8CB0D344EEF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-17\",\"matchCriteriaId\":\"0911EE99-E8EA-482F-993F-63CA578157F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-08\",\"matchCriteriaId\":\"C97FCFAE-5731-483E-9DB1-B15C1F10B292\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-18\",\"matchCriteriaId\":\"10EE8CC8-5957-4DC9-AB60-EA27C0FCFDC0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-52\",\"versionEndIncluding\":\"08-52-22\",\"matchCriteriaId\":\"93F95B95-3D0D-4B12-B2AF-3FC3C9341232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"32B3F4C6-32FE-41B8-AB64-F47053D12686\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"795A5DBD-5E00-430F-9556-4D7DD7F26EBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"9F1F9438-0952-4B83-AA04-B3825D29438D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-15\",\"matchCriteriaId\":\"C1C3DD59-1E66-4D3E-AD18-5585B50AD3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"1E652FA6-D612-458C-BA72-29346A0AC5FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"DEE5A9A9-A02B-4C54-8FFE-B33A67692AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netdm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-24\",\"matchCriteriaId\":\"85912BE6-5606-4DF2-B021-DDA9C579C169\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-06\",\"matchCriteriaId\":\"3B6E9DD2-1DE6-4C12-98F3-BA8877783E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-03\",\"matchCriteriaId\":\"1597B309-9C51-48A9-8DC5-DB6ED05EF9CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-04\",\"matchCriteriaId\":\"49FBB16A-1FF3-44FF-9023-9E21E9064335\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-10\",\"matchCriteriaId\":\"3FAFA401-1F96-4400-8BF8-F1F1C99DB455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-06\",\"matchCriteriaId\":\"C12ACA7E-7A79-49B4-91BA-BF99105C3C07\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-04\",\"matchCriteriaId\":\"A228B5AB-EDB0-4A36-8414-101B86B19195\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-14\",\"matchCriteriaId\":\"0EBA2D9F-ABD5-4E20-A197-0A5D9F71A52E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-13\",\"matchCriteriaId\":\"3CA1805D-967E-4048-B3F6-3667274606F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-12\",\"matchCriteriaId\":\"69568387-3EA3-4438-852F-CD221C8EF970\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"5A622280-D90B-4C00-8F09-4095490867F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-08\",\"matchCriteriaId\":\"35863FFC-1077-44CF-9EE1-E3A29B387976\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-20\",\"matchCriteriaId\":\"DEDBC43E-845A-4DC6-AB3F-C2B202DFC0DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-02\",\"matchCriteriaId\":\"5B4F01A7-4BDA-402D-BB0A-43CDFC3CC1BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-01\",\"matchCriteriaId\":\"D2F87F38-CF16-4F9A-93FE-7355C982ACB1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://www.hitachi.com/hirt/security/index.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.hitachi.com/hirt/security/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…