Skip to main content

Hitachi
Contact UsContact Us

January 28, 2025
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2024-312

Vulnerability description

CVE-2024-49072
Windows Task Scheduler Elevation of Privilege Vulnerability
CVE-2024-49073
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49074
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-49075
Windows Remote Desktop Services Denial of Service Vulnerability
CVE-2024-49076
Windows Virtualization-Based Security (VBS) Enclave Elevation of Privilege Vulnerability
CVE-2024-49077
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49078
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49079
Input Method Editor (IME) Remote Code Execution Vulnerability
CVE-2024-49080
Windows IP Routing Management Snapin Remote Code Execution Vulnerability
CVE-2024-49081
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVE-2024-49082
Windows File Explorer Information Disclosure Vulnerability
CVE-2024-49083
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49084
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-49087
Windows Mobile Broadband Driver Information Disclosure Vulnerability
CVE-2024-49088
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-49089
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-49090
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-49092
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49094
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVE-2024-49095
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2024-49096
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2024-49097
Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability
CVE-2024-49098
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVE-2024-49099
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVE-2024-49101
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVE-2024-49102
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-49103
Windows Wireless Wide Area Network Service (WwanSvc) Information Disclosure Vulnerability
CVE-2024-49104
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2024-49105
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2024-49107
WmsRepair Service Elevation of Privilege Vulnerability
CVE-2024-49109
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVE-2024-49110
Windows Mobile Broadband Driver Elevation of Privilege Vulnerability
CVE-2024-49111
Wireless Wide Area Network Service (WwanSvc) Elevation of Privilege Vulnerability
CVE-2024-49112
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2024-49113
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2024-49114
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2024-49118
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-49121
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2024-49122
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-49123
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49124
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVE-2024-49126
Windows Local Security Authority Subsystem Service (LSASS) Remote Code Execution Vulnerability
CVE-2024-49127
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2024-49132
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2024-49138
Windows Common Log File System Driver Elevation of Privilege Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2024-49072, CVE-2024-49073, CVE-2024-49074, CVE-2024-49075,
CVE-2024-49076, CVE-2024-49077, CVE-2024-49078, CVE-2024-49079,
CVE-2024-49080, CVE-2024-49081, CVE-2024-49082, CVE-2024-49083,
CVE-2024-49084, CVE-2024-49087, CVE-2024-49088, CVE-2024-49089,
CVE-2024-49090, CVE-2024-49092, CVE-2024-49094, CVE-2024-49095,
CVE-2024-49096, CVE-2024-49097, CVE-2024-49098, CVE-2024-49099,
CVE-2024-49101, CVE-2024-49102, CVE-2024-49103, CVE-2024-49104,
CVE-2024-49105, CVE-2024-49107, CVE-2024-49109, CVE-2024-49110,
CVE-2024-49111, CVE-2024-49112, CVE-2024-49113, CVE-2024-49114,
CVE-2024-49118, CVE-2024-49121, CVE-2024-49122, CVE-2024-49123,
CVE-2024-49124, CVE-2024-49126, CVE-2024-49127, CVE-2024-49132,
CVE-2024-49138

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2024-49072, CVE-2024-49073, CVE-2024-49074, CVE-2024-49075,
CVE-2024-49076, CVE-2024-49077, CVE-2024-49078, CVE-2024-49079,
CVE-2024-49080, CVE-2024-49081, CVE-2024-49082, CVE-2024-49083,
CVE-2024-49084, CVE-2024-49087, CVE-2024-49088, CVE-2024-49089,
CVE-2024-49090, CVE-2024-49092, CVE-2024-49094, CVE-2024-49095,
CVE-2024-49096, CVE-2024-49097, CVE-2024-49098, CVE-2024-49099,
CVE-2024-49101, CVE-2024-49102, CVE-2024-49103, CVE-2024-49104,
CVE-2024-49105, CVE-2024-49107, CVE-2024-49109, CVE-2024-49110,
CVE-2024-49111, CVE-2024-49112, CVE-2024-49113, CVE-2024-49114,
CVE-2024-49118, CVE-2024-49121, CVE-2024-49122, CVE-2024-49123,
CVE-2024-49124, CVE-2024-49126, CVE-2024-49127, CVE-2024-49132,
CVE-2024-49138
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2024-49072, CVE-2024-49079, CVE-2024-49080, CVE-2024-49082,
CVE-2024-49084, CVE-2024-49088, CVE-2024-49089, CVE-2024-49090,
CVE-2024-49096, CVE-2024-49102, CVE-2024-49104, CVE-2024-49105,
CVE-2024-49107, CVE-2024-49112, CVE-2024-49113, CVE-2024-49118,
CVE-2024-49121, CVE-2024-49122, CVE-2024-49124, CVE-2024-49126,
CVE-2024-49127, CVE-2024-49138

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • January 28, 2025: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.