|
[Japanese]
|
JVNDB-2021-000053
|
Hitachi Virtual File Platform vulnerable to OS command injection
|
Hitachi Virtual File Platform provided by Hitachi contains an OS command injection vulnerability (CWE-78) due to a flaw in processing parameters of the HTTP requests.
Hiroki MATSUKUMA of Cyber Defense Institute, Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V3 Severity: Base Metrics 8.8 (High) [IPA Score]
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: Low
- User Interaction: None
- Scope: Unchanged
- Confidentiality Impact: High
- Integrity Impact: High
- Availability Impact: High
CVSS V2 Severity: Base Metrics 9.0 (High) [IPA Score]
- Access Vector: Network
- Access Complexity: Low
- Authentication: Single Instance
- Confidentiality Impact: Complete
- Integrity Impact: Complete
- Availability Impact: Complete
|
|
NEC Corporation
- Storage M Series NAS Gateway Nh4a/Nh8a versions prior to FOS 5.5.3-08(NEC2.5.4a)
- Storage M Series NAS Gateway Nh4b/Nh8b, Nh4c/Nh8c versions prior to FOS 6.4.3-08(NEC3.4.2)
Hitachi, Ltd
- Hitachi Virtual File Platform Versions prior to 5.5.3-09
- Hitachi Virtual File Platform Versions prior to 6.4.3-09
|
|
A remote attacker who can log in to the product may execute an arbitrary OS command with root privilege.
|
[Update the Software]
Update the software to the latest version according to the information provided by the developer.
|
NEC Corporation
Hitachi, Ltd
|
- OS Command Injection(CWE-78) [IPA Evaluation]
|
- CVE-2021-20740
|
- JVN : JVN#21298724
- National Vulnerability Database (NVD) : CVE-2021-20740
|
- [2021/06/18]
We page was published
|