ID
VAR-E-201009-0846
TITLE
Hitachi JP1/NETM/Remote Control Agent File Transfer Feature Security Bypass Vulnerability
Trust: 0.3
DESCRIPTION
Hitachi JP1/NETM/Remote Control Agent is prone to a security-bypass vulnerability.
Remote attackers can exploit this issue to bypass security restrictions and gain unauthorized access. Other attacks may also be possible.
Trust: 0.3
AFFECTED PRODUCTS
vendor: | hitachi | model: | jp1/serverconductor/agent | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/remote control set | scope: | eq | version: | (*4)0 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager embedded rdb edition | scope: | eq | version: | (*3)0 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager embedded rdb edition | scope: | eq | version: | 07-53-09 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager embedded rdb edition windows | scope: | eq | version: | 07-50 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager | scope: | eq | version: | 07-00 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager | scope: | eq | version: | 06-00 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm manager 05-24-/e | scope: | - | version: | - | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-10-02 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-10-01 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-00-04 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-00-03 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-00-02 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 08-00 | Trust: 0.3 |
vendor: | hitachi | model: | jp1/netm/dm client | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution submanager | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution manager embedded windows | scope: | eq | version: | 07-50 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution manager embedded windows | scope: | eq | version: | 05-23(*1) | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution manager windows | scope: | eq | version: | 08-00-03 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution manager windows | scope: | eq | version: | 05-10 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution manager | scope: | eq | version: | 0 | Trust: 0.3 |
vendor: | hitachi | model: | job management partner 1/software distribution client | scope: | eq | version: | 0 | Trust: 0.3 |
EXPLOIT
An attacker can exploit this issue by using readily available network utilities.
Trust: 0.3
PRICE
Free
Trust: 0.3
TYPE
Design Error
Trust: 0.3
CREDITS
Reported by the vendor
Trust: 0.3
EXTERNAL IDS
db: | HITACHI | id: | HS10-025 | Trust: 0.3 |
db: | BID | id: | 43361 | Trust: 0.3 |
REFERENCES
url: | http://www.hitachi.co.jp/prod/comp/soft1/security/info/vuls/hs10-025/index.html | Trust: 0.3 |
url: | http://www.hds.com/products/storage-software/hitachi-device-manager.html | Trust: 0.3 |
url: | http://www.hitachi.co.jp/prod/comp/soft1/global/prod/jp1/ | Trust: 0.3 |
SOURCES
db: | BID | id: | 43361 |
LAST UPDATE DATE
2022-07-27T09:19:26.664000+00:00
SOURCES UPDATE DATE
db: | BID | id: | 43361 | date: | 2010-09-08T00:00:00 |
SOURCES RELEASE DATE
db: | BID | id: | 43361 | date: | 2010-09-08T00:00:00 |