Skip to main content

Hitachi
Contact UsContact Us

September 21, 2023
Hitachi, Ltd. IT Platform Products Management Division

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

Hitachi-sec-2023-303

Vulnerability description

CVE-2023-1017
CERT/CC: CVE-2023-1017 TPM2.0 Module Library Elevation of Privilege Vulnerability
CVE-2023-1018
CERT/CC: CVE-2023-1018 TPM2.0 Module Library Elevation of Privilege Vulnerability
CVE-2023-21708
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-23385
Windows Point-to-Point Protocol over Ethernet (PPPoE) Elevation of Privilege Vulnerability
CVE-2023-23388
Windows Bluetooth Driver Elevation of Privilege Vulnerability
CVE-2023-23393
Windows Broker Infrastructure Service Elevation of Privilege Vulnerability
CVE-2023-23394
Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability
CVE-2023-23401
Windows Media Remote Code Execution Vulnerability
CVE-2023-23402
Windows Media Remote Code Execution Vulnerability
CVE-2023-23403
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-23404
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-23405
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-23406
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-23407
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
CVE-2023-23409
Client Server Run-Time Subsystem (CSRSS) Information Disclosure Vulnerability
CVE-2023-23410
Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2023-23411
Windows Hyper-V Denial of Service Vulnerability
CVE-2023-23412
Windows Accounts Picture Elevation of Privilege Vulnerability
CVE-2023-23413
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-23414
Windows Point-to-Point Protocol over Ethernet (PPPoE) Remote Code Execution Vulnerability
CVE-2023-23415
Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability
CVE-2023-23416
Windows Cryptographic Services Remote Code Execution Vulnerability
CVE-2023-23417
Windows Partition Management Driver Elevation of Privilege Vulnerability
CVE-2023-23420
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-23421
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-23422
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-23423
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-24856
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24857
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24858
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24859
Windows Internet Key Exchange (IKE) Extension Denial of Service Vulnerability
CVE-2023-24861
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-24862
Windows Secure Channel Denial of Service Vulnerability
CVE-2023-24863
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24864
Microsoft PostScript and PCL6 Class Printer Driver Elevation of Privilege Vulnerability
CVE-2023-24865
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24866
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24867
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24868
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24869
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-24870
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24872
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24876
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24880
Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2023-24906
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24907
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24908
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-24909
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24910
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-24911
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24913
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID
CVE-2023-1017, CVE-2023-1018, CVE-2023-21708, CVE-2023-23385,
CVE-2023-23388, CVE-2023-23393, CVE-2023-23394, CVE-2023-23401,
CVE-2023-23402, CVE-2023-23403, CVE-2023-23404, CVE-2023-23405,
CVE-2023-23406, CVE-2023-23407, CVE-2023-23409, CVE-2023-23410,
CVE-2023-23411, CVE-2023-23412, CVE-2023-23413, CVE-2023-23414,
CVE-2023-23415, CVE-2023-23416, CVE-2023-23417, CVE-2023-23420,
CVE-2023-23421, CVE-2023-23422, CVE-2023-23423, CVE-2023-24856,
CVE-2023-24857, CVE-2023-24858, CVE-2023-24859, CVE-2023-24861,
CVE-2023-24862, CVE-2023-24863, CVE-2023-24864, CVE-2023-24865,
CVE-2023-24866, CVE-2023-24867, CVE-2023-24868, CVE-2023-24869,
CVE-2023-24870, CVE-2023-24872, CVE-2023-24876, CVE-2023-24880,
CVE-2023-24906, CVE-2023-24907, CVE-2023-24908, CVE-2023-24909,
CVE-2023-24910, CVE-2023-24911, CVE-2023-24913
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2023-1017, CVE-2023-1018, CVE-2023-21708, CVE-2023-23385,
CVE-2023-23394, CVE-2023-23401, CVE-2023-23402, CVE-2023-23403,
CVE-2023-23404, CVE-2023-23405, CVE-2023-23406, CVE-2023-23407,
CVE-2023-23409, CVE-2023-23410, CVE-2023-23411, CVE-2023-23412,
CVE-2023-23413, CVE-2023-23414, CVE-2023-23415, CVE-2023-23416,
CVE-2023-23420, CVE-2023-23421, CVE-2023-23422, CVE-2023-23423,
CVE-2023-24856, CVE-2023-24857, CVE-2023-24858, CVE-2023-24859,
CVE-2023-24861, CVE-2023-24862, CVE-2023-24863, CVE-2023-24864,
CVE-2023-24865, CVE-2023-24866, CVE-2023-24867, CVE-2023-24868,
CVE-2023-24869, CVE-2023-24870, CVE-2023-24872, CVE-2023-24876,
CVE-2023-24906, CVE-2023-24907, CVE-2023-24908, CVE-2023-24909,
CVE-2023-24910, CVE-2023-24911, CVE-2023-24913

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • September 21, 2023: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.