CVE-2021-29645 (GCVE-0-2021-29645)
Vulnerability from cvelistv5 – Published: 2021-10-12 18:30 – Updated: 2024-08-03 22:11
VLAI?
Summary
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Severity ?
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:11:06.115Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-10-12T18:30:35",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.hitachi.com/hirt/security/index.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-29645",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system."
}
]
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AC:H/AV:L/A:H/C:H/I:H/PR:L/S:U/UI:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.hitachi.com/hirt/security/index.html",
"refsource": "MISC",
"url": "https://www.hitachi.com/hirt/security/index.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-29645",
"datePublished": "2021-10-12T18:30:35",
"dateReserved": "2021-03-30T00:00:00",
"dateUpdated": "2024-08-03T22:11:06.115Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"02-50\", \"versionEndIncluding\": \"02-50-07\", \"matchCriteriaId\": \"31A6D122-6529-4CD7-83F1-890BAAD30C9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"03-00\", \"versionEndIncluding\": \"03-00-12\", \"matchCriteriaId\": \"B84C240B-B22A-4807-B45E-A2785FA8AA12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"04-00\", \"versionEndIncluding\": \"04-00-17\", \"matchCriteriaId\": \"708AC60B-61B2-4815-AF92-8FC22A57BAA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"04-50\", \"versionEndIncluding\": \"04-50-16\", \"matchCriteriaId\": \"74C01FBB-9E1C-41B0-9ABE-DDA2990709FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-03\", \"matchCriteriaId\": \"10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-01\", \"versionEndIncluding\": \"10-01-06\", \"matchCriteriaId\": \"92C9B7F0-5605-4CF4-9394-7C5CBF447341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-16\", \"matchCriteriaId\": \"AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-50\", \"versionEndIncluding\": \"10-50-11\", \"matchCriteriaId\": \"FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-04\", \"matchCriteriaId\": \"A4B7DD39-855D-4B3D-B452-321E2E22E006\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-05\", \"matchCriteriaId\": \"3D151B64-9A48-4B94-B275-1BEC48BF27A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-18\", \"matchCriteriaId\": \"990B0997-6841-48CC-9546-4EFA60CFCA81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-07\", \"matchCriteriaId\": \"5FED75E6-0EEC-4931-91D8-4243061CCB4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"ECF36556-471D-4834-8436-8FEF37ED8D36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-15\", \"matchCriteriaId\": \"0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-05\", \"matchCriteriaId\": \"9BCD7221-2A96-4B3D-A10B-D73287474298\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-06\", \"matchCriteriaId\": \"9339148D-F498-468E-BE3E-1F80C89EC11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-19\", \"matchCriteriaId\": \"F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-09\", \"matchCriteriaId\": \"8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"136167A6-3EF7-4A1C-86BE-B832CE215236\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-13\", \"matchCriteriaId\": \"776952E7-1A18-4BC8-B966-07A53CE790BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-07\", \"matchCriteriaId\": \"C369C0F6-902F-4268-B354-9653836C06C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-06\", \"matchCriteriaId\": \"6CAF3001-BAC1-47BC-94C1-0B17CB5F894F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-19\", \"matchCriteriaId\": \"397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-09\", \"matchCriteriaId\": \"B36991F6-3AA7-47F9-8E1C-80A57FD8AB34\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-09\", \"matchCriteriaId\": \"431C9492-8992-4744-8BAA-48369B169186\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-13\", \"matchCriteriaId\": \"D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-03\", \"matchCriteriaId\": \"A1AA3676-A96A-4B48-B7E4-DAD57AFA9934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-05\", \"matchCriteriaId\": \"A8CF0981-4417-4C0F-A085-F0AF8E7A94FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-00\", \"versionEndIncluding\": \"10-00-02\", \"matchCriteriaId\": \"51AADEA3-240A-4841-931C-3D85937EDC53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-01\", \"versionEndIncluding\": \"10-01-05\", \"matchCriteriaId\": \"A1A1E153-4E63-4B59-B4EA-0A553FA084CF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-02\", \"versionEndIncluding\": \"10-02-05\", \"matchCriteriaId\": \"525F9923-07A4-43A0-890E-CB353D0E04E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-16\", \"matchCriteriaId\": \"27F62337-69A8-42C1-A089-1A102CC59B37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-50\", \"versionEndIncluding\": \"10-50-12\", \"matchCriteriaId\": \"4BA040ED-71DA-49EA-8B25-09240A64D428\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-00\", \"versionEndIncluding\": \"11-00-11\", \"matchCriteriaId\": \"F9C8AA35-7F59-447A-A0CD-1DF8C6292F30\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-01\", \"versionEndIncluding\": \"11-01-12\", \"matchCriteriaId\": \"2243155A-E21E-483F-B121-AC011760C665\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-10\", \"versionEndIncluding\": \"11-10-10\", \"matchCriteriaId\": \"B1F1C470-34BD-4929-9E3C-908153D88527\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-50\", \"versionEndIncluding\": \"11-50-08\", \"matchCriteriaId\": \"707FC4B6-AA33-46D1-928F-B9A7EAD31841\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-51\", \"versionEndIncluding\": \"11-51-10\", \"matchCriteriaId\": \"25F48D5A-79A2-4396-8F67-CF1732449575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-09\", \"matchCriteriaId\": \"9596730E-5CCB-499D-B13E-D274A3D0FD9D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-10\", \"versionEndIncluding\": \"12-10-07\", \"matchCriteriaId\": \"F419ADC2-EB1E-4977-93A0-EDE6FA64FC90\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-50\", \"versionEndIncluding\": \"12-50-03\", \"matchCriteriaId\": \"DC4AB47E-8E26-46FC-A5FA-7113149CB0D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-01\", \"versionEndIncluding\": \"11-01-12\", \"matchCriteriaId\": \"504B2990-0F85-46E6-8F00-AB501BC413B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-10\", \"versionEndIncluding\": \"11-10-10\", \"matchCriteriaId\": \"647CD056-0A30-405C-9A45-7666E076E287\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-50\", \"versionEndIncluding\": \"11-50-08\", \"matchCriteriaId\": \"5F03002F-CB77-48D0-A2BF-986532E097AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-51\", \"versionEndIncluding\": \"11-51-10\", \"matchCriteriaId\": \"5A77A383-D5DA-450E-8472-920DD58343D4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-09\", \"matchCriteriaId\": \"EE2A1932-6B77-4D3B-AF72-3B6105F92F4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-10\", \"versionEndIncluding\": \"12-10-07\", \"matchCriteriaId\": \"2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-50\", \"versionEndIncluding\": \"12-50-03\", \"matchCriteriaId\": \"6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-09\", \"matchCriteriaId\": \"4BC313F8-478C-4445-8FF4-4C3D4452B88D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-04\", \"matchCriteriaId\": \"31099812-DFC5-4205-8D5F-6C8FC5CA71AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-07\", \"matchCriteriaId\": \"8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-13\", \"matchCriteriaId\": \"9D0CAD86-355F-4DBE-A397-A7497533F6EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-17\", \"matchCriteriaId\": \"4DA36C31-7753-42E8-8752-9EA286A31D5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-12\", \"versionEndIncluding\": \"08-12-03\", \"matchCriteriaId\": \"73018662-C036-40AB-B85C-6D84FAD4B937\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-08\", \"matchCriteriaId\": \"98F6AD56-5D63-4C1A-9B19-0845F5B298FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-17\", \"matchCriteriaId\": \"561DA909-0503-4B1B-B132-E06157EAFD15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-52\", \"versionEndIncluding\": \"08-52-22\", \"matchCriteriaId\": \"9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-14\", \"matchCriteriaId\": \"C10FDCBE-17E7-4C05-BD7E-128E5500A461\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-14\", \"matchCriteriaId\": \"A2133302-B6F4-48E0-A3E8-2EF971F4D349\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-15\", \"matchCriteriaId\": \"0012F47A-9F14-4305-A7CB-6A7F09D7224B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-12\", \"versionEndIncluding\": \"09-12-16\", \"matchCriteriaId\": \"61A24A5E-A62F-4D67-8A17-7E58E6C61C94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"1CC78F4B-E608-46F9-941B-9522A5B9106E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-14\", \"matchCriteriaId\": \"8467AC9A-66C5-4EF1-A430-8B9176ECFEBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-23\", \"matchCriteriaId\": \"9057F305-7CAD-4CBE-BE9C-5669831A9FE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-06\", \"matchCriteriaId\": \"6BD1AFB9-87CD-4751-8F41-888E7056F256\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-03\", \"matchCriteriaId\": \"9B69D310-5149-4986-AFCC-400992F7B14E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-04\", \"matchCriteriaId\": \"A0218938-33D0-454E-8341-FADEEA90529C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-10\", \"matchCriteriaId\": \"13D283D2-6122-492F-A31D-E0C8EBB8D152\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-06\", \"matchCriteriaId\": \"C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-04\", \"matchCriteriaId\": \"AF19CFBE-D55A-4054-BD5C-2A06590C1A3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-14\", \"matchCriteriaId\": \"773C6952-5080-4DA7-966D-556218293088\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-13\", \"matchCriteriaId\": \"37F23999-9338-4311-8340-ECB08E3F31B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-12\", \"matchCriteriaId\": \"BE9B8B1E-F13E-4B23-ACFE-877A72576C99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-13\", \"matchCriteriaId\": \"5B65371A-8686-44C9-99BC-111C0DF4C919\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-19\", \"matchCriteriaId\": \"57BA5BF2-B522-47EB-8A7B-38C08FAFD71D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-08\", \"matchCriteriaId\": \"34F0C0B3-EE46-40A3-B3C3-1122173289F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-20\", \"matchCriteriaId\": \"D500C8CA-F351-403C-9DD9-B158F83A3EB5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-09\", \"matchCriteriaId\": \"E99EC517-62E4-44FD-9079-1975ACEE8889\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-07\", \"matchCriteriaId\": \"ED1F992D-103C-4EE9-AFE2-3B4F204C36E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-13\", \"matchCriteriaId\": \"9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-17\", \"matchCriteriaId\": \"4AE2D087-E798-4446-B570-5A9B44DDA8C5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-08\", \"matchCriteriaId\": \"0536E8B8-1590-45C1-9D0D-0B99F5D2C248\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-18\", \"matchCriteriaId\": \"3DD3518E-A2BC-45E8-AACF-54E3B7F28394\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-52\", \"versionEndIncluding\": \"08-52-22\", \"matchCriteriaId\": \"DAA24699-08F2-4DEF-B9CB-9D0BD8977309\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-14\", \"matchCriteriaId\": \"EAC1C287-47F7-42A4-9DC1-3454DF43D11E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-14\", \"matchCriteriaId\": \"22525249-56B6-46A9-8ADC-533645E288B9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-10\", \"versionEndIncluding\": \"09-10-15\", \"matchCriteriaId\": \"F308CDDC-B026-46D7-B23A-DABA40EF65A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-12\", \"versionEndIncluding\": \"09-12-15\", \"matchCriteriaId\": \"9BE06C8C-7653-400E-B5E2-FCB6B2326ED4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"23272F34-B271-448C-B631-C4800F716E7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-14\", \"matchCriteriaId\": \"C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-24\", \"matchCriteriaId\": \"E04AA952-315D-475D-B1A9-A66469FE1F9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-00\", \"versionEndIncluding\": \"08-00-06\", \"matchCriteriaId\": \"672D8CDE-47C5-413C-BB2B-FF8388D530F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-01\", \"versionEndIncluding\": \"08-01-03\", \"matchCriteriaId\": \"59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-02\", \"versionEndIncluding\": \"08-02-04\", \"matchCriteriaId\": \"F8998308-E56A-4541-8091-AB8841367C62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-10\", \"versionEndIncluding\": \"08-10-10\", \"matchCriteriaId\": \"E2F1B409-8698-4CA7-AC96-EAE24FA0CC51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-11\", \"versionEndIncluding\": \"08-11-06\", \"matchCriteriaId\": \"0C194761-70AB-4032-8751-6517572DFC4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-50\", \"versionEndIncluding\": \"08-50-04\", \"matchCriteriaId\": \"7851FE95-219E-4E99-A0D3-C5C96C03DC46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"08-51\", \"versionEndIncluding\": \"08-51-14\", \"matchCriteriaId\": \"84E52AFB-9D8F-4969-A458-177DA4555E67\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-00\", \"versionEndIncluding\": \"09-00-13\", \"matchCriteriaId\": \"F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-01\", \"versionEndIncluding\": \"09-01-12\", \"matchCriteriaId\": \"7A36817D-2F89-45F5-8045-B3ADBB10B5E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-50\", \"versionEndIncluding\": \"09-50-20\", \"matchCriteriaId\": \"315B8EBE-40DB-4CEE-852C-94DCF5861DC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"09-51\", \"versionEndIncluding\": \"09-51-08\", \"matchCriteriaId\": \"37C2F07D-C94F-413E-AECA-35226D13D150\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10-10\", \"versionEndIncluding\": \"10-10-20\", \"matchCriteriaId\": \"EDB7B46E-A3A7-4082-9495-2687608E9F3A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"11-00\", \"versionEndIncluding\": \"11-00-02\", \"matchCriteriaId\": \"547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:hitachi:jp1\\\\/remote_control_feature:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"12-00\", \"versionEndIncluding\": \"12-00-011\", \"matchCriteriaId\": \"0140D278-CB13-4375-AA57-9D57EA82A14D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.\"}, {\"lang\": \"es\", \"value\": \"Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\\u00eda ejecutar c\\u00f3digo arbitrario en el sistema local\"}]",
"id": "CVE-2021-29645",
"lastModified": "2024-11-21T06:01:33.630",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve@mitre.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.0, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.0, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-10-12T19:15:07.677",
"references": "[{\"url\": \"https://www.hitachi.com/hirt/security/index.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.hitachi.com/hirt/security/index.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-29645\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-10-12T19:15:07.677\",\"lastModified\":\"2024-11-21T06:01:33.630\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.\"},{\"lang\":\"es\",\"value\":\"Hitachi JP1/IT Desktop Management 2 Agent versiones 9 hasta 12, llaman a la API SendMessageTimeoutW con argumentos arbitrarios por medio de una tuber\u00eda local, conllevando a una vulnerabilidad de escalada de privilegios local. Un atacante que explote este problema podr\u00eda ejecutar c\u00f3digo arbitrario en el sistema local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve@mitre.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"02-50\",\"versionEndIncluding\":\"02-50-07\",\"matchCriteriaId\":\"31A6D122-6529-4CD7-83F1-890BAAD30C9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"03-00\",\"versionEndIncluding\":\"03-00-12\",\"matchCriteriaId\":\"B84C240B-B22A-4807-B45E-A2785FA8AA12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"04-00\",\"versionEndIncluding\":\"04-00-17\",\"matchCriteriaId\":\"708AC60B-61B2-4815-AF92-8FC22A57BAA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:it_operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"04-50\",\"versionEndIncluding\":\"04-50-16\",\"matchCriteriaId\":\"74C01FBB-9E1C-41B0-9ABE-DDA2990709FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-03\",\"matchCriteriaId\":\"10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-01\",\"versionEndIncluding\":\"10-01-06\",\"matchCriteriaId\":\"92C9B7F0-5605-4CF4-9394-7C5CBF447341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-16\",\"matchCriteriaId\":\"AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-11\",\"matchCriteriaId\":\"FD5C9D6D-2BAB-4289-95BE-8ED6BD5D994A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-04\",\"matchCriteriaId\":\"A4B7DD39-855D-4B3D-B452-321E2E22E006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-05\",\"matchCriteriaId\":\"3D151B64-9A48-4B94-B275-1BEC48BF27A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-18\",\"matchCriteriaId\":\"990B0997-6841-48CC-9546-4EFA60CFCA81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-07\",\"matchCriteriaId\":\"5FED75E6-0EEC-4931-91D8-4243061CCB4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"ECF36556-471D-4834-8436-8FEF37ED8D36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/remote_control_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-15\",\"matchCriteriaId\":\"0CE9B4AE-DB2A-4B65-BBAD-F68DFB0E31AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-05\",\"matchCriteriaId\":\"9BCD7221-2A96-4B3D-A10B-D73287474298\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-06\",\"matchCriteriaId\":\"9339148D-F498-468E-BE3E-1F80C89EC11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-19\",\"matchCriteriaId\":\"F88D9EF0-6D7A-409A-BB3B-BFF03E784A8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-09\",\"matchCriteriaId\":\"8F53BDF6-EF12-4405-BB6C-5ABB2C932B7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"136167A6-3EF7-4A1C-86BE-B832CE215236\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-13\",\"matchCriteriaId\":\"776952E7-1A18-4BC8-B966-07A53CE790BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-07\",\"matchCriteriaId\":\"C369C0F6-902F-4268-B354-9653836C06C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-06\",\"matchCriteriaId\":\"6CAF3001-BAC1-47BC-94C1-0B17CB5F894F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-19\",\"matchCriteriaId\":\"397B722F-0A81-4FF8-A8C9-CCFC63BE8CFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-09\",\"matchCriteriaId\":\"B36991F6-3AA7-47F9-8E1C-80A57FD8AB34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-09\",\"matchCriteriaId\":\"431C9492-8992-4744-8BAA-48369B169186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/software_distribution_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-13\",\"matchCriteriaId\":\"D67D6AE7-93B6-4AD8-8F9F-610E9B4718E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-03\",\"matchCriteriaId\":\"A1AA3676-A96A-4B48-B7E4-DAD57AFA9934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-05\",\"matchCriteriaId\":\"A8CF0981-4417-4C0F-A085-F0AF8E7A94FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-00\",\"versionEndIncluding\":\"10-00-02\",\"matchCriteriaId\":\"51AADEA3-240A-4841-931C-3D85937EDC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-01\",\"versionEndIncluding\":\"10-01-05\",\"matchCriteriaId\":\"A1A1E153-4E63-4B59-B4EA-0A553FA084CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-02\",\"versionEndIncluding\":\"10-02-05\",\"matchCriteriaId\":\"525F9923-07A4-43A0-890E-CB353D0E04E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-16\",\"matchCriteriaId\":\"27F62337-69A8-42C1-A089-1A102CC59B37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-12\",\"matchCriteriaId\":\"4BA040ED-71DA-49EA-8B25-09240A64D428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-11\",\"matchCriteriaId\":\"F9C8AA35-7F59-447A-A0CD-1DF8C6292F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"2243155A-E21E-483F-B121-AC011760C665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"B1F1C470-34BD-4929-9E3C-908153D88527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"707FC4B6-AA33-46D1-928F-B9A7EAD31841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"25F48D5A-79A2-4396-8F67-CF1732449575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"9596730E-5CCB-499D-B13E-D274A3D0FD9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-07\",\"matchCriteriaId\":\"F419ADC2-EB1E-4977-93A0-EDE6FA64FC90\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-03\",\"matchCriteriaId\":\"DC4AB47E-8E26-46FC-A5FA-7113149CB0D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"504B2990-0F85-46E6-8F00-AB501BC413B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"647CD056-0A30-405C-9A45-7666E076E287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"5F03002F-CB77-48D0-A2BF-986532E097AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"5A77A383-D5DA-450E-8472-920DD58343D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"EE2A1932-6B77-4D3B-AF72-3B6105F92F4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-07\",\"matchCriteriaId\":\"2BD40F5D-7DA3-4D8E-B1EA-30FA0163C9CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-03\",\"matchCriteriaId\":\"6DC6250B-A8AA-4F8B-9A64-5790B2E7C8F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-09\",\"matchCriteriaId\":\"4BC313F8-478C-4445-8FF4-4C3D4452B88D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-04\",\"matchCriteriaId\":\"31099812-DFC5-4205-8D5F-6C8FC5CA71AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-07\",\"matchCriteriaId\":\"8FF13BEC-4F0B-470F-8B81-D87CC1B1BA14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-13\",\"matchCriteriaId\":\"9D0CAD86-355F-4DBE-A397-A7497533F6EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-17\",\"matchCriteriaId\":\"4DA36C31-7753-42E8-8752-9EA286A31D5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-12\",\"versionEndIncluding\":\"08-12-03\",\"matchCriteriaId\":\"73018662-C036-40AB-B85C-6D84FAD4B937\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-08\",\"matchCriteriaId\":\"98F6AD56-5D63-4C1A-9B19-0845F5B298FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-17\",\"matchCriteriaId\":\"561DA909-0503-4B1B-B132-E06157EAFD15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-52\",\"versionEndIncluding\":\"08-52-22\",\"matchCriteriaId\":\"9319FDE3-AFAB-4EBD-B61E-7EDD33E8E654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"C10FDCBE-17E7-4C05-BD7E-128E5500A461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"A2133302-B6F4-48E0-A3E8-2EF971F4D349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"0012F47A-9F14-4305-A7CB-6A7F09D7224B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-16\",\"matchCriteriaId\":\"61A24A5E-A62F-4D67-8A17-7E58E6C61C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"1CC78F4B-E608-46F9-941B-9522A5B9106E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"8467AC9A-66C5-4EF1-A430-8B9176ECFEBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-23\",\"matchCriteriaId\":\"9057F305-7CAD-4CBE-BE9C-5669831A9FE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-06\",\"matchCriteriaId\":\"6BD1AFB9-87CD-4751-8F41-888E7056F256\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-03\",\"matchCriteriaId\":\"9B69D310-5149-4986-AFCC-400992F7B14E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-04\",\"matchCriteriaId\":\"A0218938-33D0-454E-8341-FADEEA90529C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-10\",\"matchCriteriaId\":\"13D283D2-6122-492F-A31D-E0C8EBB8D152\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-06\",\"matchCriteriaId\":\"C57D39F0-8AE0-4F58-9AC4-05DAE7E62F8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-04\",\"matchCriteriaId\":\"AF19CFBE-D55A-4054-BD5C-2A06590C1A3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-14\",\"matchCriteriaId\":\"773C6952-5080-4DA7-966D-556218293088\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-13\",\"matchCriteriaId\":\"37F23999-9338-4311-8340-ECB08E3F31B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-12\",\"matchCriteriaId\":\"BE9B8B1E-F13E-4B23-ACFE-877A72576C99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-13\",\"matchCriteriaId\":\"5B65371A-8686-44C9-99BC-111C0DF4C919\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-19\",\"matchCriteriaId\":\"57BA5BF2-B522-47EB-8A7B-38C08FAFD71D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-08\",\"matchCriteriaId\":\"34F0C0B3-EE46-40A3-B3C3-1122173289F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client-remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-20\",\"matchCriteriaId\":\"D500C8CA-F351-403C-9DD9-B158F83A3EB5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-09\",\"matchCriteriaId\":\"E99EC517-62E4-44FD-9079-1975ACEE8889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-07\",\"matchCriteriaId\":\"ED1F992D-103C-4EE9-AFE2-3B4F204C36E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-13\",\"matchCriteriaId\":\"9FE7F58B-A3FC-426E-ACDB-97B85EF3A3B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-17\",\"matchCriteriaId\":\"4AE2D087-E798-4446-B570-5A9B44DDA8C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-08\",\"matchCriteriaId\":\"0536E8B8-1590-45C1-9D0D-0B99F5D2C248\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-18\",\"matchCriteriaId\":\"3DD3518E-A2BC-45E8-AACF-54E3B7F28394\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-52\",\"versionEndIncluding\":\"08-52-22\",\"matchCriteriaId\":\"DAA24699-08F2-4DEF-B9CB-9D0BD8977309\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"EAC1C287-47F7-42A4-9DC1-3454DF43D11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"22525249-56B6-46A9-8ADC-533645E288B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"F308CDDC-B026-46D7-B23A-DABA40EF65A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-15\",\"matchCriteriaId\":\"9BE06C8C-7653-400E-B5E2-FCB6B2326ED4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"23272F34-B271-448C-B631-C4800F716E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-24\",\"matchCriteriaId\":\"E04AA952-315D-475D-B1A9-A66469FE1F9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-00\",\"versionEndIncluding\":\"08-00-06\",\"matchCriteriaId\":\"672D8CDE-47C5-413C-BB2B-FF8388D530F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-01\",\"versionEndIncluding\":\"08-01-03\",\"matchCriteriaId\":\"59C0ABB0-6DDC-495B-9F84-8FFAABAAB72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-02\",\"versionEndIncluding\":\"08-02-04\",\"matchCriteriaId\":\"F8998308-E56A-4541-8091-AB8841367C62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-10\",\"versionEndIncluding\":\"08-10-10\",\"matchCriteriaId\":\"E2F1B409-8698-4CA7-AC96-EAE24FA0CC51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-11\",\"versionEndIncluding\":\"08-11-06\",\"matchCriteriaId\":\"0C194761-70AB-4032-8751-6517572DFC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-50\",\"versionEndIncluding\":\"08-50-04\",\"matchCriteriaId\":\"7851FE95-219E-4E99-A0D3-C5C96C03DC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"08-51\",\"versionEndIncluding\":\"08-51-14\",\"matchCriteriaId\":\"84E52AFB-9D8F-4969-A458-177DA4555E67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-13\",\"matchCriteriaId\":\"F7FEF59D-2E4B-41D4-BA4D-7E1E97A4FD71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-12\",\"matchCriteriaId\":\"7A36817D-2F89-45F5-8045-B3ADBB10B5E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"315B8EBE-40DB-4CEE-852C-94DCF5861DC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-08\",\"matchCriteriaId\":\"37C2F07D-C94F-413E-AECA-35226D13D150\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-20\",\"matchCriteriaId\":\"EDB7B46E-A3A7-4082-9495-2687608E9F3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-02\",\"matchCriteriaId\":\"547F1F7D-DDDF-43DA-AF1D-2761CAEC0B4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/remote_control_feature:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-011\",\"matchCriteriaId\":\"0140D278-CB13-4375-AA57-9D57EA82A14D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://www.hitachi.com/hirt/security/index.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.hitachi.com/hirt/security/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…