Hitachi Vulnerabilities

Comprehensive security vulnerability database for Hitachi products

Last updated: Oct 6, 2022
Total CVEs

3

Critical

0

With Exploits

2

Last 30 Days

0

Severity Distribution

Critical0
0%
High2
67%
Medium1
33%
Low0
0%
DescriptionVendor / ProductExploit Status
CVE-2022-26378.8

This vulnerability allows a remote user with valid login credentials to gain higher privileges than intended within the Hitachi Storage Plug-in for VMware vCenter, potentially giving them unauthorized access to sensitive functions or data. It affects versions from 04.8.0 up to, but not including, 04.9.0, meaning users on these versions are at risk if they have authenticated access.

hitachistorage plug-in
Exploit Available
over 3 years agoOct 6, 2022
CVE-2022-348838.8

This vulnerability allows an attacker with valid login credentials to remotely run any command on the affected Hitachi RAID Manager Storage Replication Adapter, potentially giving them full control over the system. It affects specific versions of the software on Windows and Docker, so users need to ensure they are using the latest updates to protect against this risk.

hitachiraid manager storage replication adapter
Theoretical
over 3 years agoSep 6, 2022
CVE-2022-348826.5

This vulnerability allows remote authenticated users to access sensitive information through error messages generated by the Hitachi RAID Manager Storage Replication Adapter. It affects specific older versions of the software on Windows and Docker, meaning attackers need valid login credentials to exploit it.

hitachiraid manager storage replication adapter
Exploit Available
over 3 years agoSep 6, 2022

About Hitachi Security

This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Hitachi products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.

Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.