CVE-2025-65116 (GCVE-0-2025-65116)
Vulnerability from cvelistv5 – Published: 2026-04-07 05:43 – Updated: 2026-04-07 13:25
VLAI?
Title
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 and JP1/NETM/DM
Summary
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.
Severity ?
5.5 (Medium)
CWE
- CWE-763 - Release of invalid pointer or reference
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Hitachi | JP1/IT Desktop Management 2 - Manager |
Affected:
13-50 , < 13-50-02
(custom)
Affected: 13-11 , < 13-11-04 (custom) Affected: 13-10 , < 13-10-07 (custom) Affected: 13-01 , < 13-01-07 (custom) Affected: 13-00 , < 13-00-05 (custom) Affected: 12-60 , < 12-60-12 (custom) Affected: 10-50 , ≤ 12-50-11 (custom) |
||||||||||||||||||||||||||||||||||||||||||
|
||||||||||||||||||||||||||||||||||||||||||||
Credits
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-65116",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-04-07T13:25:49.919013Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2026-04-07T13:25:56.036Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "JP1/IT Desktop Management 2 - Manager",
"vendor": "Hitachi",
"versions": [
{
"changes": [
{
"at": "13-50-02",
"status": "unaffected"
}
],
"lessThan": "13-50-02",
"status": "affected",
"version": "13-50",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-11-04",
"status": "unaffected"
}
],
"lessThan": "13-11-04",
"status": "affected",
"version": "13-11",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-10-07",
"status": "unaffected"
}
],
"lessThan": "13-10-07",
"status": "affected",
"version": "13-10",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-01-07",
"status": "unaffected"
}
],
"lessThan": "13-01-07",
"status": "affected",
"version": "13-01",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-00-05",
"status": "unaffected"
}
],
"lessThan": "13-00-05",
"status": "affected",
"version": "13-00",
"versionType": "custom"
},
{
"changes": [
{
"at": "12-60-12",
"status": "unaffected"
}
],
"lessThan": "12-60-12",
"status": "affected",
"version": "12-60",
"versionType": "custom"
},
{
"lessThanOrEqual": "12-50-11",
"status": "affected",
"version": "10-50",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "JP1/IT Desktop Management 2 - Operations Director",
"vendor": "Hitachi",
"versions": [
{
"changes": [
{
"at": "13-50-02",
"status": "unaffected"
}
],
"lessThan": "13-50-02",
"status": "affected",
"version": "13-50",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-11-04",
"status": "unaffected"
}
],
"lessThan": "13-11-04",
"status": "affected",
"version": "13-11",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-10-07",
"status": "unaffected"
}
],
"lessThan": "13-10-07",
"status": "affected",
"version": "13-10",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-01-07",
"status": "unaffected"
}
],
"lessThan": "13-01-07",
"status": "affected",
"version": "13-01",
"versionType": "custom"
},
{
"changes": [
{
"at": "13-00-05",
"status": "unaffected"
}
],
"lessThan": "13-00-05",
"status": "affected",
"version": "13-00",
"versionType": "custom"
},
{
"changes": [
{
"at": "12-60-12",
"status": "unaffected"
}
],
"lessThan": "12-60-12",
"status": "affected",
"version": "12-60",
"versionType": "custom"
},
{
"lessThanOrEqual": "12-50-11",
"status": "affected",
"version": "10-50",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Job Management Partner 1/IT Desktop Management 2 - Manager",
"vendor": "Hitachi",
"versions": [
{
"lessThanOrEqual": "10-50-11",
"status": "affected",
"version": "10-50",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "JP1/IT Desktop Management - Manager",
"vendor": "Hitachi",
"versions": [
{
"lessThanOrEqual": "10-10-16",
"status": "affected",
"version": "09-50",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Job Management Partner 1/IT Desktop Management - Manager",
"vendor": "Hitachi",
"versions": [
{
"lessThanOrEqual": "10-10-16",
"status": "affected",
"version": "09-50",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "JP1/NETM/DM Manager",
"vendor": "Hitachi",
"versions": [
{
"changes": [
{
"at": "10-30",
"status": "unaffected"
}
],
"lessThanOrEqual": "10-20-02",
"status": "affected",
"version": "09-00",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "JP1/NETM/DM Client",
"vendor": "Hitachi",
"versions": [
{
"changes": [
{
"at": "10-30",
"status": "unaffected"
}
],
"lessThanOrEqual": "10-20-02",
"status": "affected",
"version": "09-00",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Job Management Partner 1/Software Distribution Manager",
"vendor": "Hitachi",
"versions": [
{
"lessThanOrEqual": "09-51-13",
"status": "affected",
"version": "09-00",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows"
],
"product": "Job Management Partner 1/Software Distribution Client",
"vendor": "Hitachi",
"versions": [
{
"lessThanOrEqual": "09-51-13",
"status": "affected",
"version": "09-00",
"versionType": "custom"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Ruslan Sayfiev"
},
{
"lang": "en",
"type": "finder",
"value": "Denis Faiustov"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.\u003cp\u003eThis issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.\u003c/p\u003e"
}
],
"value": "Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-763",
"description": "CWE-763 Release of invalid pointer or reference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-04-07T05:43:25.553Z",
"orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82",
"shortName": "Hitachi"
},
"references": [
{
"url": "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-118/index.html"
}
],
"source": {
"advisory": "hitachi-sec-2026-118",
"discovery": "EXTERNAL"
},
"title": "Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 and JP1/NETM/DM",
"x_generator": {
"engine": "Vulnogram 1.0.1"
}
}
},
"cveMetadata": {
"assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82",
"assignerShortName": "Hitachi",
"cveId": "CVE-2025-65116",
"datePublished": "2026-04-07T05:43:25.553Z",
"dateReserved": "2025-11-18T01:27:41.899Z",
"dateUpdated": "2026-04-07T13:25:56.036Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-65116",
"date": "2026-05-05",
"epss": "6e-05",
"percentile": "0.00334"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-65116\",\"sourceIdentifier\":\"hirt@hitachi.co.jp\",\"published\":\"2026-04-07T06:16:41.073\",\"lastModified\":\"2026-04-28T16:50:53.783\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"hirt@hitachi.co.jp\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"hirt@hitachi.co.jp\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-763\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-03\",\"matchCriteriaId\":\"10C1B8DB-75C0-4D16-85B0-C6FE8B08F9CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-05\",\"matchCriteriaId\":\"D0D22C1C-B881-4091-8E48-BE2158B5341C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-00\",\"versionEndIncluding\":\"10-00-02\",\"matchCriteriaId\":\"7035F19B-7043-457F-AAB8-F29DF4FF1BEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-01\",\"versionEndIncluding\":\"10-01-05\",\"matchCriteriaId\":\"7F7B8F74-63C5-407A-8694-C4DF81DFF76E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-02\",\"versionEndIncluding\":\"10-02-05\",\"matchCriteriaId\":\"565BF27B-44A4-42CF-8F49-F6D774A250D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:job_management_partner_1\\\\/it_desktop_management-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-16\",\"matchCriteriaId\":\"AA7FB97D-5B44-4AB2-9A73-CAE8B938DCD7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-12\",\"matchCriteriaId\":\"4BA040ED-71DA-49EA-8B25-09240A64D428\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-11\",\"matchCriteriaId\":\"F9C8AA35-7F59-447A-A0CD-1DF8C6292F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"2243155A-E21E-483F-B121-AC011760C665\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"B1F1C470-34BD-4929-9E3C-908153D88527\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"707FC4B6-AA33-46D1-928F-B9A7EAD31841\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"25F48D5A-79A2-4396-8F67-CF1732449575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"9596730E-5CCB-499D-B13E-D274A3D0FD9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-12\",\"matchCriteriaId\":\"18EC228B-4825-42DA-BC52-CC1C3835F87B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-11\",\"matchCriteriaId\":\"CC26C576-2B01-4A51-8EE9-323DEE25E9ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-60\",\"versionEndIncluding\":\"12-60-11\",\"matchCriteriaId\":\"053E4518-C267-49A1-8DC5-6B91BB593203\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-00\",\"versionEndIncluding\":\"13-00-04\",\"matchCriteriaId\":\"72ECC5B2-1B74-47DD-BABC-E162D95AFA55\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-01\",\"versionEndIncluding\":\"13-01-06\",\"matchCriteriaId\":\"EC1CE6A7-28C2-4999-88FE-D62F5B42F5D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-10\",\"versionEndIncluding\":\"13-10-06\",\"matchCriteriaId\":\"359945BB-FDFC-4CCF-83A2-18096BE8366A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-11\",\"versionEndIncluding\":\"13-11-03\",\"matchCriteriaId\":\"D3B9BB03-4386-44DB-9C6F-BE0DE78729D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-50\",\"versionEndIncluding\":\"13-50-01\",\"matchCriteriaId\":\"B1CE2FEF-CD57-4255-B461-4A6C2F020A52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-50\",\"versionEndIncluding\":\"10-50-12\",\"matchCriteriaId\":\"AD6238A6-8EAB-41A4-A5EA-6B728565D3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-00\",\"versionEndIncluding\":\"11-00-11\",\"matchCriteriaId\":\"8A5FAEC7-2848-4816-8DD4-893FFE3580B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-01\",\"versionEndIncluding\":\"11-01-12\",\"matchCriteriaId\":\"504B2990-0F85-46E6-8F00-AB501BC413B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-10\",\"versionEndIncluding\":\"11-10-10\",\"matchCriteriaId\":\"647CD056-0A30-405C-9A45-7666E076E287\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-50\",\"versionEndIncluding\":\"11-50-08\",\"matchCriteriaId\":\"5F03002F-CB77-48D0-A2BF-986532E097AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11-51\",\"versionEndIncluding\":\"11-51-10\",\"matchCriteriaId\":\"5A77A383-D5DA-450E-8472-920DD58343D4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-00\",\"versionEndIncluding\":\"12-00-09\",\"matchCriteriaId\":\"EE2A1932-6B77-4D3B-AF72-3B6105F92F4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-10\",\"versionEndIncluding\":\"12-10-12\",\"matchCriteriaId\":\"34F87D5C-96D4-43E0-A0B2-922C41F02F1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-50\",\"versionEndIncluding\":\"12-50-11\",\"matchCriteriaId\":\"A5739890-EFA5-4C3C-B003-418D87FA81DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12-60\",\"versionEndIncluding\":\"12-60-11\",\"matchCriteriaId\":\"8590EFB4-DFCF-4AC7-9505-F35020BC03ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-00\",\"versionEndIncluding\":\"13-00-04\",\"matchCriteriaId\":\"8CECD702-8940-415C-850E-BE339EEA460D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-01\",\"versionEndIncluding\":\"13-01-06\",\"matchCriteriaId\":\"271C199F-6099-49A2-AF13-813F771609C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-10\",\"versionEndIncluding\":\"13-10-06\",\"matchCriteriaId\":\"9992AF5B-DAAB-4507-97D3-AA72316E09E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-11\",\"versionEndIncluding\":\"13-11-03\",\"matchCriteriaId\":\"2F4BB988-F252-447F-BE73-61DC50926114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/it_desktop_management_2-operations_director:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"13-50\",\"versionEndIncluding\":\"13-50-01\",\"matchCriteriaId\":\"AF5F0890-4534-413C-8EE3-326FE1CE2063\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"EAC1C287-47F7-42A4-9DC1-3454DF43D11E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"22525249-56B6-46A9-8ADC-533645E288B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"F308CDDC-B026-46D7-B23A-DABA40EF65A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-16\",\"matchCriteriaId\":\"F9C790BF-A2CD-4347-AFB9-C5F6B9DFE0CF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"23272F34-B271-448C-B631-C4800F716E7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"C5F3A52F-45B0-4812-AD3B-FB76FBDD0E01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-25\",\"matchCriteriaId\":\"467654F7-719D-4428-9957-235BAAA8BCBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-20\",\"versionEndIncluding\":\"10-20-02\",\"matchCriteriaId\":\"FABC46FA-CD6D-4442-ADE3-D9D9AC6F3CE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-00\",\"versionEndIncluding\":\"09-00-14\",\"matchCriteriaId\":\"C10FDCBE-17E7-4C05-BD7E-128E5500A461\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-01\",\"versionEndIncluding\":\"09-01-14\",\"matchCriteriaId\":\"A2133302-B6F4-48E0-A3E8-2EF971F4D349\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-10\",\"versionEndIncluding\":\"09-10-15\",\"matchCriteriaId\":\"0012F47A-9F14-4305-A7CB-6A7F09D7224B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-12\",\"versionEndIncluding\":\"09-12-16\",\"matchCriteriaId\":\"61A24A5E-A62F-4D67-8A17-7E58E6C61C94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-50\",\"versionEndIncluding\":\"09-50-20\",\"matchCriteriaId\":\"1CC78F4B-E608-46F9-941B-9522A5B9106E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"09-51\",\"versionEndIncluding\":\"09-51-14\",\"matchCriteriaId\":\"8467AC9A-66C5-4EF1-A430-8B9176ECFEBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-10\",\"versionEndIncluding\":\"10-10-25\",\"matchCriteriaId\":\"C9C9D963-7CCC-4515-9460-B1ECF3A8FBD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:hitachi:jp1\\\\/netm\\\\/dm_client:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10-20\",\"versionEndIncluding\":\"10-20-02\",\"matchCriteriaId\":\"B46BB74A-6538-4CF7-A60A-FF7A0FA0F788\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-118/index.html\",\"source\":\"hirt@hitachi.co.jp\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-65116\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-04-07T13:25:49.919013Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-04-07T13:25:52.930Z\"}}], \"cna\": {\"title\": \"Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 and JP1/NETM/DM\", \"source\": {\"advisory\": \"hitachi-sec-2026-118\", \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Ruslan Sayfiev\"}, {\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Denis Faiustov\"}], \"impacts\": [{\"capecId\": \"CAPEC-100\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-100 Overflow Buffers\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hitachi\", \"product\": \"JP1/IT Desktop Management 2 - Manager\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"13-50-02\", \"status\": \"unaffected\"}], \"version\": \"13-50\", \"lessThan\": \"13-50-02\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-11-04\", \"status\": \"unaffected\"}], \"version\": \"13-11\", \"lessThan\": \"13-11-04\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-10-07\", \"status\": \"unaffected\"}], \"version\": \"13-10\", \"lessThan\": \"13-10-07\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-01-07\", \"status\": \"unaffected\"}], \"version\": \"13-01\", \"lessThan\": \"13-01-07\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-00-05\", \"status\": \"unaffected\"}], \"version\": \"13-00\", \"lessThan\": \"13-00-05\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"12-60-12\", \"status\": \"unaffected\"}], \"version\": \"12-60\", \"lessThan\": \"12-60-12\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"10-50\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"12-50-11\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"JP1/IT Desktop Management 2 - Operations Director\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"13-50-02\", \"status\": \"unaffected\"}], \"version\": \"13-50\", \"lessThan\": \"13-50-02\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-11-04\", \"status\": \"unaffected\"}], \"version\": \"13-11\", \"lessThan\": \"13-11-04\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-10-07\", \"status\": \"unaffected\"}], \"version\": \"13-10\", \"lessThan\": \"13-10-07\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-01-07\", \"status\": \"unaffected\"}], \"version\": \"13-01\", \"lessThan\": \"13-01-07\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"13-00-05\", \"status\": \"unaffected\"}], \"version\": \"13-00\", \"lessThan\": \"13-00-05\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"changes\": [{\"at\": \"12-60-12\", \"status\": \"unaffected\"}], \"version\": \"12-60\", \"lessThan\": \"12-60-12\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"10-50\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"12-50-11\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"Job Management Partner 1/IT Desktop Management 2 - Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"10-50\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"10-50-11\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"JP1/IT Desktop Management - Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"09-50\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"10-10-16\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"Job Management Partner 1/IT Desktop Management - Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"09-50\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"10-10-16\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"JP1/NETM/DM Manager\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"10-30\", \"status\": \"unaffected\"}], \"version\": \"09-00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"10-20-02\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"JP1/NETM/DM Client\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"10-30\", \"status\": \"unaffected\"}], \"version\": \"09-00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"10-20-02\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"Job Management Partner 1/Software Distribution Manager\", \"versions\": [{\"status\": \"affected\", \"version\": \"09-00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"09-51-13\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Hitachi\", \"product\": \"Job Management Partner 1/Software Distribution Client\", \"versions\": [{\"status\": \"affected\", \"version\": \"09-00\", \"versionType\": \"custom\", \"lessThanOrEqual\": \"09-51-13\"}], \"platforms\": [\"Windows\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-118/index.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 1.0.1\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.\u003cp\u003eThis issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-763\", \"description\": \"CWE-763 Release of invalid pointer or reference\"}]}], \"providerMetadata\": {\"orgId\": \"50d0f415-c707-4733-9afc-8f6c0e9b3f82\", \"shortName\": \"Hitachi\", \"dateUpdated\": \"2026-04-07T05:43:25.553Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-65116\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-04-07T13:25:56.036Z\", \"dateReserved\": \"2025-11-18T01:27:41.899Z\", \"assignerOrgId\": \"50d0f415-c707-4733-9afc-8f6c0e9b3f82\", \"datePublished\": \"2026-04-07T05:43:25.553Z\", \"assignerShortName\": \"Hitachi\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
Loading…
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…