Skip to main content

Hitachi
Contact UsContact Us

December 6, 2024
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2024-310

Vulnerability description

CVE-2024-20659
Windows Hyper-V Security Feature Bypass Vulnerability
CVE-2024-30092
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2024-37976
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
CVE-2024-37982
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
CVE-2024-37983
Windows Resume Extensible Firmware Interface Security Feature Bypass Vulnerability
CVE-2024-38149
BranchCache Denial of Service Vulnerability
CVE-2024-43483
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVE-2024-43484
.NET, .NET Framework, and Visual Studio Denial of Service Vulnerability
CVE-2024-43501
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-43502
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-43506
BranchCache Denial of Service Vulnerability
CVE-2024-43509
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-43511
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-43513
BitLocker Security Feature Bypass Vulnerability
CVE-2024-43514
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2024-43515
Internet Small Computer Systems Interface (iSCSI) Denial of Service Vulnerability
CVE-2024-43516
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-43517
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
CVE-2024-43518
Windows Telephony Server Remote Code Execution Vulnerability
CVE-2024-43519
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-43520
Windows Kernel Denial of Service Vulnerability
CVE-2024-43523
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43524
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43525
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43526
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43528
Windows Secure Kernel Mode Elevation of Privilege Vulnerability
CVE-2024-43529
Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2024-43532
Remote Registry Service Elevation of Privilege Vulnerability
CVE-2024-43534
Windows Graphics Component Information Disclosure Vulnerability
CVE-2024-43535
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2024-43536
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43537
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43538
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43540
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43542
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43543
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2024-43546
Windows Cryptographic Information Disclosure Vulnerability
CVE-2024-43547
Windows Kerberos Information Disclosure Vulnerability
CVE-2024-43550
Windows Secure Channel Spoofing Vulnerability
CVE-2024-43551
Windows Storage Elevation of Privilege Vulnerability
CVE-2024-43553
NT OS Kernel Elevation of Privilege Vulnerability
CVE-2024-43554
Windows Kernel-Mode Driver Information Disclosure Vulnerability
CVE-2024-43555
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43556
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2024-43557
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43558
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43559
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43560
Microsoft Windows Storage Port Driver Elevation of Privilege Vulnerability
CVE-2024-43561
Windows Mobile Broadband Driver Denial of Service Vulnerability
CVE-2024-43562
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-43563
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2024-43565
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-43570
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-43572
Microsoft Management Console Remote Code Execution Vulnerability
CVE-2024-43573
Windows MSHTML Platform Spoofing Vulnerability
CVE-2024-43574
Microsoft Speech Application Programming Interface (SAPI) Remote Code Execution Vulnerability
CVE-2024-43581
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-43582
Remote Desktop Protocol Server Remote Code Execution Vulnerability
CVE-2024-43583
Winlogon Elevation of Privilege Vulnerability
CVE-2024-43585
Code Integrity Guard Security Feature Bypass Vulnerability
CVE-2024-43599
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2024-43615
Microsoft OpenSSH for Windows Remote Code Execution Vulnerability
CVE-2024-6197
Open Source Curl Remote Code Execution Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2024-20659, CVE-2024-30092, CVE-2024-37976, CVE-2024-37982,
CVE-2024-37983, CVE-2024-38149, CVE-2024-43483, CVE-2024-43484,
CVE-2024-43501, CVE-2024-43502, CVE-2024-43506, CVE-2024-43509,
CVE-2024-43511, CVE-2024-43513, CVE-2024-43514, CVE-2024-43515,
CVE-2024-43516, CVE-2024-43517, CVE-2024-43518, CVE-2024-43519,
CVE-2024-43520, CVE-2024-43523, CVE-2024-43524, CVE-2024-43525,
CVE-2024-43526, CVE-2024-43528, CVE-2024-43532, CVE-2024-43534,
CVE-2024-43535, CVE-2024-43536, CVE-2024-43537, CVE-2024-43538,
CVE-2024-43540, CVE-2024-43542, CVE-2024-43543, CVE-2024-43547,
CVE-2024-43550, CVE-2024-43551, CVE-2024-43553, CVE-2024-43554,
CVE-2024-43555, CVE-2024-43556, CVE-2024-43557, CVE-2024-43558,
CVE-2024-43559, CVE-2024-43560, CVE-2024-43561, CVE-2024-43562,
CVE-2024-43563, CVE-2024-43565, CVE-2024-43570, CVE-2024-43572,
CVE-2024-43573, CVE-2024-43581, CVE-2024-43582, CVE-2024-43583,
CVE-2024-43585, CVE-2024-43599, CVE-2024-43615, CVE-2024-6197

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2024-20659, CVE-2024-30092, CVE-2024-37976, CVE-2024-37982,
CVE-2024-37983, CVE-2024-38149, CVE-2024-43483, CVE-2024-43484,
CVE-2024-43501, CVE-2024-43502, CVE-2024-43506, CVE-2024-43509,
CVE-2024-43511, CVE-2024-43513, CVE-2024-43514, CVE-2024-43515,
CVE-2024-43516, CVE-2024-43517, CVE-2024-43518, CVE-2024-43519,
CVE-2024-43520, CVE-2024-43523, CVE-2024-43524, CVE-2024-43525,
CVE-2024-43526, CVE-2024-43528, CVE-2024-43529, CVE-2024-43532,
CVE-2024-43534, CVE-2024-43535, CVE-2024-43536, CVE-2024-43537,
CVE-2024-43538, CVE-2024-43540, CVE-2024-43542, CVE-2024-43543,
CVE-2024-43546, CVE-2024-43547, CVE-2024-43550, CVE-2024-43551,
CVE-2024-43553, CVE-2024-43554, CVE-2024-43555, CVE-2024-43556,
CVE-2024-43557, CVE-2024-43558, CVE-2024-43559, CVE-2024-43560,
CVE-2024-43561, CVE-2024-43562, CVE-2024-43563, CVE-2024-43565,
CVE-2024-43570, CVE-2024-43572, CVE-2024-43573, CVE-2024-43574,
CVE-2024-43581, CVE-2024-43582, CVE-2024-43583, CVE-2024-43585,
CVE-2024-43599, CVE-2024-43615, CVE-2024-6197
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2024-30092, CVE-2024-37976, CVE-2024-37982, CVE-2024-37983,
CVE-2024-38149, CVE-2024-43483, CVE-2024-43484, CVE-2024-43501,
CVE-2024-43506, CVE-2024-43509, CVE-2024-43511, CVE-2024-43513,
CVE-2024-43514, CVE-2024-43515, CVE-2024-43516, CVE-2024-43517,
CVE-2024-43518, CVE-2024-43519, CVE-2024-43520, CVE-2024-43532,
CVE-2024-43534, CVE-2024-43535, CVE-2024-43547, CVE-2024-43550,
CVE-2024-43553, CVE-2024-43554, CVE-2024-43556, CVE-2024-43560,
CVE-2024-43562, CVE-2024-43563, CVE-2024-43565, CVE-2024-43570,
CVE-2024-43572, CVE-2024-43573, CVE-2024-43583, CVE-2024-43599

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • December 6, 2024: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.