Hitachi Vulnerabilities
Comprehensive security vulnerability database for Hitachi products
3
0
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2022-2637 | 8.8 | This vulnerability allows a remote user with valid login credentials to gain higher privileges than intended within the Hitachi Storage Plug-in for VMware vCenter, potentially giving them unauthorized access to sensitive functions or data. It affects versions from 04.8.0 up to, but not including, 04.9.0, meaning users on these versions are at risk if they have authenticated access. | hitachistorage plug-in | Exploit Available | over 3 years agoOct 6, 2022 |
| CVE-2022-34883 | 8.8 | This vulnerability allows an attacker with valid login credentials to remotely run any command on the affected Hitachi RAID Manager Storage Replication Adapter, potentially giving them full control over the system. It affects specific versions of the software on Windows and Docker, so users need to ensure they are using the latest updates to protect against this risk. | hitachiraid manager storage replication adapter | Theoretical | over 3 years agoSep 6, 2022 |
| CVE-2022-34882 | 6.5 | This vulnerability allows remote authenticated users to access sensitive information through error messages generated by the Hitachi RAID Manager Storage Replication Adapter. It affects specific older versions of the software on Windows and Docker, meaning attackers need valid login credentials to exploit it. | hitachiraid manager storage replication adapter | Exploit Available | over 3 years agoSep 6, 2022 |
About Hitachi Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Hitachi products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.