Skip to main content

Hitachi
Contact UsContact Us

August 8, 2024
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2024-307

Vulnerability description

CVE-2024-21417
Windows Text Services Framework Elevation of Privilege Vulnerability
CVE-2024-26184
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-28899
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-30013
Windows MultiPoint Services Remote Code Execution Vulnerability
CVE-2024-30071
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2024-30079
Windows Remote Access Connection Manager Elevation of Privilege Vulnerability
CVE-2024-30081
Windows NTLM Spoofing Vulnerability
CVE-2024-30098
Windows Cryptographic Services Security Feature Bypass Vulnerability
CVE-2024-35270
Windows iSCSI Service Denial of Service Vulnerability
CVE-2024-3596
CERT/CC: CVE-2024-3596 RADIUS Protocol Spoofing Vulnerability
CVE-2024-37969
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37970
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37971
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37972
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37973
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37974
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37975
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37981
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37984
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37986
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37987
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37988
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-37989
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38010
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38011
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38013
Microsoft Windows Server Backup Elevation of Privilege Vulnerability
CVE-2024-38017
Microsoft Message Queuing Information Disclosure Vulnerability
CVE-2024-38019
Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
CVE-2024-38022
Windows Image Acquisition Elevation of Privilege Vulnerability
CVE-2024-38025
Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
CVE-2024-38027
Windows Line Printer Daemon Service Denial of Service Vulnerability
CVE-2024-38028
Microsoft Windows Performance Data Helper Library Remote Code Execution Vulnerability
CVE-2024-38030
Windows Themes Spoofing Vulnerability
CVE-2024-38032
Microsoft Xbox Remote Code Execution Vulnerability
CVE-2024-38033
PowerShell Elevation of Privilege Vulnerability
CVE-2024-38034
Windows Filtering Platform Elevation of Privilege Vulnerability
CVE-2024-38041
Windows Kernel Information Disclosure Vulnerability
CVE-2024-38043
PowerShell Elevation of Privilege Vulnerability
CVE-2024-38047
PowerShell Elevation of Privilege Vulnerability
CVE-2024-38048
Windows Network Driver Interface Specification (NDIS) Denial of Service Vulnerability
CVE-2024-38049
Windows Distributed Transaction Coordinator Remote Code Execution Vulnerability
CVE-2024-38050
Windows Workstation Service Elevation of Privilege Vulnerability
CVE-2024-38051
Windows Graphics Component Remote Code Execution Vulnerability
CVE-2024-38052
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38053
Windows Layer-2 Bridge Network Driver Remote Code Execution Vulnerability
CVE-2024-38054
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38055
Microsoft Windows Codecs Library Information Disclosure Vulnerability
CVE-2024-38056
Microsoft Windows Codecs Library Information Disclosure Vulnerability
CVE-2024-38057
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2024-38058
BitLocker Security Feature Bypass Vulnerability
CVE-2024-38059
Win32k Elevation of Privilege Vulnerability
CVE-2024-38060
Windows Imaging Component Remote Code Execution Vulnerability
CVE-2024-38061
DCOM Remote Cross-Session Activation Elevation of Privilege Vulnerability
CVE-2024-38062
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-38064
Windows TCP/IP Information Disclosure Vulnerability
CVE-2024-38065
Secure Boot Security Feature Bypass Vulnerability
CVE-2024-38066
Windows Win32k Elevation of Privilege Vulnerability
CVE-2024-38068
Windows Online Certificate Status Protocol (OCSP) Server Denial of Service Vulnerability
CVE-2024-38069
Windows Enroll Engine Security Feature Bypass Vulnerability
CVE-2024-38070
Windows Lock Down Policy (WLDP) Security Feature Bypass Vulnerability
CVE-2024-38079
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38081
.NET, .NET Framework, and Visual Studio Elevation of Privilege Vulnerability
CVE-2024-38085
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-38091
Microsoft WS-Discovery Denial of Service Vulnerability
CVE-2024-38101
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38102
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38104
Windows Fax Service Remote Code Execution Vulnerability
CVE-2024-38105
Windows Layer-2 Bridge Network Driver Denial of Service Vulnerability
CVE-2024-38112
Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-38517
Github: CVE-2024-38517 TenCent Rapid JSON Elevation of Privilege Vulnerability
CVE-2024-39684
Github: CVE-2024-39684 TenCent Rapid JSON Elevation of Privilege Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2024-21417, CVE-2024-28899, CVE-2024-30013, CVE-2024-30071,
CVE-2024-30079, CVE-2024-30081, CVE-2024-30098, CVE-2024-35270,
CVE-2024-3596, CVE-2024-37969, CVE-2024-37970, CVE-2024-37971,
CVE-2024-37972, CVE-2024-37973, CVE-2024-37974, CVE-2024-37975,
CVE-2024-37981, CVE-2024-37984, CVE-2024-37986, CVE-2024-37987,
CVE-2024-37988, CVE-2024-37989, CVE-2024-38010, CVE-2024-38011,
CVE-2024-38013, CVE-2024-38017, CVE-2024-38019, CVE-2024-38022,
CVE-2024-38025, CVE-2024-38027, CVE-2024-38028, CVE-2024-38030,
CVE-2024-38033, CVE-2024-38034, CVE-2024-38041, CVE-2024-38043,
CVE-2024-38047, CVE-2024-38048, CVE-2024-38049, CVE-2024-38050,
CVE-2024-38051, CVE-2024-38052, CVE-2024-38053, CVE-2024-38054,
CVE-2024-38055, CVE-2024-38056, CVE-2024-38057, CVE-2024-38058,
CVE-2024-38060, CVE-2024-38061, CVE-2024-38062, CVE-2024-38064,
CVE-2024-38065, CVE-2024-38066, CVE-2024-38068, CVE-2024-38069,
CVE-2024-38070, CVE-2024-38079, CVE-2024-38081, CVE-2024-38085,
CVE-2024-38091, CVE-2024-38101, CVE-2024-38102, CVE-2024-38104,
CVE-2024-38105, CVE-2024-38112, CVE-2024-38517, CVE-2024-39684

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2024-21417, CVE-2024-26184, CVE-2024-28899, CVE-2024-30013,
CVE-2024-30071, CVE-2024-30079, CVE-2024-30081, CVE-2024-30098,
CVE-2024-35270, CVE-2024-3596, CVE-2024-37969, CVE-2024-37970,
CVE-2024-37971, CVE-2024-37972, CVE-2024-37973, CVE-2024-37974,
CVE-2024-37975, CVE-2024-37981, CVE-2024-37984, CVE-2024-37986,
CVE-2024-37987, CVE-2024-37988, CVE-2024-37989, CVE-2024-38010,
CVE-2024-38011, CVE-2024-38013, CVE-2024-38017, CVE-2024-38019,
CVE-2024-38022, CVE-2024-38025, CVE-2024-38027, CVE-2024-38028,
CVE-2024-38030, CVE-2024-38032, CVE-2024-38033, CVE-2024-38034,
CVE-2024-38041, CVE-2024-38043, CVE-2024-38047, CVE-2024-38048,
CVE-2024-38049, CVE-2024-38050, CVE-2024-38051, CVE-2024-38052,
CVE-2024-38053, CVE-2024-38054, CVE-2024-38055, CVE-2024-38056,
CVE-2024-38057, CVE-2024-38058, CVE-2024-38059, CVE-2024-38060,
CVE-2024-38061, CVE-2024-38062, CVE-2024-38064, CVE-2024-38065,
CVE-2024-38066, CVE-2024-38068, CVE-2024-38069, CVE-2024-38070,
CVE-2024-38079, CVE-2024-38081, CVE-2024-38085, CVE-2024-38091,
CVE-2024-38101, CVE-2024-38102, CVE-2024-38104, CVE-2024-38105,
CVE-2024-38112, CVE-2024-38517, CVE-2024-39684
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2024-28899, CVE-2024-30071, CVE-2024-30079, CVE-2024-30081,
CVE-2024-30098, CVE-2024-35270, CVE-2024-3596, CVE-2024-37969,
CVE-2024-37970, CVE-2024-37971, CVE-2024-37972, CVE-2024-37973,
CVE-2024-37974, CVE-2024-37975, CVE-2024-37984, CVE-2024-37986,
CVE-2024-37987, CVE-2024-37988, CVE-2024-37989, CVE-2024-38010,
CVE-2024-38011, CVE-2024-38013, CVE-2024-38017, CVE-2024-38019,
CVE-2024-38022, CVE-2024-38025, CVE-2024-38027, CVE-2024-38028,
CVE-2024-38030, CVE-2024-38033, CVE-2024-38034, CVE-2024-38048,
CVE-2024-38049, CVE-2024-38050, CVE-2024-38051, CVE-2024-38052,
CVE-2024-38053, CVE-2024-38054, CVE-2024-38055, CVE-2024-38056,
CVE-2024-38057, CVE-2024-38058, CVE-2024-38060, CVE-2024-38061,
CVE-2024-38064, CVE-2024-38065, CVE-2024-38066, CVE-2024-38068,
CVE-2024-38069, CVE-2024-38070, CVE-2024-38079, CVE-2024-38081,
CVE-2024-38085, CVE-2024-38091, CVE-2024-38101, CVE-2024-38102,
CVE-2024-38104, CVE-2024-38105, CVE-2024-38112, CVE-2024-39684

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • August 8, 2024: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.