Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2020-36695: hitachi-sec-2023-124: File and Directory Permissions Vulnerability in Hitachi Command Suite

Incorrect Default Permissions vulnerability in Hitachi Device Manager on Linux (Device Manager Server component), Hitachi Tiered Storage Manager on Linux, Hitachi Replication Manager on Linux, Hitachi Tuning Manager on Linux (Hitachi Tuning Manager server, Hitachi Tuning Manager - Agent for RAID, Hitachi Tuning Manager - Agent for NAS

components), Hitachi Compute Systems Manager on Linux allows File Manipulation.This issue affects Hitachi Device Manager: before 8.8.5-02; Hitachi Tiered Storage Manager: before 8.8.5-02; Hitachi Replication Manager: before 8.8.5-02; Hitachi Tuning Manager: before 8.8.5-02; Hitachi Compute Systems Manager: before 8.8.3-08.

CVE
#vulnerability#web#windows#linux
  • Security Information ID
  • Vulnerability description
  • Affected products
  • Fixed products
  • Revision history

Update: July 18, 2023

A File and Directory Permissions Vulnerability (CVE-2020-36695) exists in Hitachi Command Suite.

Security Information ID

hitachi-sec-2023-124

Vulnerability description

A File and Directory Permissions Vulnerability exists in Hitachi Command Suite.

  • CVE-2020-36695: File and Directory Permissions Vulnerability in Hitachi Command Suite (Display new window)
    CVSS SCORE: 6.6(Medium) CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H

Affected products and versions are listed below. Please upgrade your version to the appropriate version.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform

Gives the affected version.

**Product name: Hitachi Device Manager
Component name: Device Manager server
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Tiered Storage Manager
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Replication Manager
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Tuning Manager
Component name: Hitachi Tuning Manager server
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Tuning Manager
Component name: Hitachi Tuning Manager - Agent for RAID
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Tuning Manager
Component name: Hitachi Tuning Manager - Agent for NAS
**

Version(s):

Linux

less than 8.8.5-02

**Product name: Hitachi Compute Systems Manager
**

Version(s):

Linux

less than 8.8.3-08

General Precautions Regarding Vulnerabilities

We do not plan to investigate or respond to storage management software vulnerabilities that arise from the management and monitoring of storage devices whose support period has ended.
To prevent the impact of such latent vulnerabilities, remove storage devices whose support period has ended from the management and monitoring target of the storage management software.

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform

Gives the fixed version, and release date.

Scheduled version:

Platform

Gives the fixed version scheduled to be released.

**Product name: Hitachi Device Manager
**

Version(s):

Linux(*1)

8.8.5-02 July 10, 2023

**Product name: Hitachi Tiered Storage Manager
**

Version(s):

Linux(*1)

8.8.5-02 July 10, 2023

**Product name: Hitachi Replication Manager
**

Version(s):

Linux(*1)

8.8.5-02 July 10, 2023

**Product name: Hitachi Tuning Manager(*2)
**

Version(s):

Linux(*1)

8.8.5-02 July 10, 2023

**Product name: Hitachi Compute Systems Manager
**

Version(s):

Linux

8.8.3-08 July 10, 2023

*1

Solaris is no longer supported. Use the fixed version for Windows or Linux.

*2

Hitachi Tuning Manager - Agent for RAID and Hitachi Tuning Manager - Agent for NAS must also be upgraded.

For details on the fixed products, contact your Hitachi support service representative.

Revision history

July 18, 2023

This page is released.

  • Hitachi, Ltd. (hereinafter referred to as “Hitachi”) tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907