CVE-2022-34883
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with valid login credentials to remotely run any command on the affected Hitachi RAID Manager Storage Replication Adapter, potentially giving them full control over the system. It affects specific versions of the software on Windows and Docker, so users need to ensure they are using the latest updates to protect against this risk.
Technical Description
OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Sep 6, 2022
over 3 years ago
Last Modified
Feb 25, 2026
about 1 month ago
Vendor
hitachi
Product
raid manager storage replication adapter
Related Vulnerabilities
This vulnerability allows a remote user with valid login credentials to gain higher privileges than intended within the Hitachi Storage Plug-in for VMware vCenter, potentially giving them unauthorized access to sensitive functions or data. It affects versions from 04.8.0 up to, but not including, 04.9.0, meaning users on these versions are at risk if they have authenticated access.
This vulnerability allows remote authenticated users to access sensitive information through error messages generated by the Hitachi RAID Manager Storage Replication Adapter. It affects specific older versions of the software on Windows and Docker, meaning attackers need valid login credentials to exploit it.