Vulnerabilites related to hitachi - raid_manager_storage_replication_adapter
CVE-2022-34882 (GCVE-0-2022-34882)
Vulnerability from cvelistv5
Published
2022-09-06 06:30
Modified
2024-08-03 09:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-209 - Information Exposure Through an Error Message
Summary
Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Hitachi | RAID Manager Storage Replication Adapter |
Version: 02.01.04 < 02.03.02 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.618Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "RAID Manager Storage Replication Adapter", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "02.03.02", "status": "unaffected" } ], "lessThan": "02.03.02", "status": "affected", "version": "02.01.04", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Docker" ], "product": "RAID Manager Storage Replication Adapter", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "02.05.01", "status": "unaffected" } ], "lessThan": "02.05.01", "status": "affected", "version": "02.05.00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eInformation Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\u003c/p\u003e" } ], "value": "Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-209", "description": "CWE-209 Information Exposure Through an Error Message", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-21T09:13:58.156Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "source": { "advisory": "hitachi-sec-2022-307", "discovery": "UNKNOWN" }, "title": "Information Exposure Vulnerability in RAID Manager Storage Replication Adapter", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hirt@hitachi.co.jp", "ID": "CVE-2022-34882", "STATE": "PUBLIC", "TITLE": "Information Exposure Vulnerability in RAID Manager Storage Replication Adapter" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "RAID Manager Storage Replication Adapter", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "02.01.04", "version_value": "02.03.02" }, { "platform": "Windows and Docker", "version_affected": "\u003c", "version_name": "02.05.00", "version_value": "02.05.01" } ] } } ] }, "vendor_name": "Hitachi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-209 Information Exposure Through an Error Message" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2022/2022_307.html", "refsource": "MISC", "url": "https://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2022/2022_307.html" } ] }, "source": { "advisory": "hitachi-sec-2022-307", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-34882", "datePublished": "2022-09-06T06:30:14", "dateReserved": "2022-06-30T00:00:00", "dateUpdated": "2024-08-03T09:22:10.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-34883 (GCVE-0-2022-34883)
Vulnerability from cvelistv5
Published
2022-09-06 06:30
Modified
2024-08-03 09:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - OS Command Injection
Summary
OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Hitachi | RAID Manager Storage Replication Adapter |
Version: 02.01.04 < 02.03.02 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T09:22:10.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "RAID Manager Storage Replication Adapter", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "02.03.02", "status": "unaffected" } ], "lessThan": "02.03.02", "status": "affected", "version": "02.01.04", "versionType": "custom" } ] }, { "defaultStatus": "unaffected", "platforms": [ "Windows", "Docker" ], "product": "RAID Manager Storage Replication Adapter", "vendor": "Hitachi", "versions": [ { "changes": [ { "at": "02.05.01", "status": "unaffected" } ], "lessThan": "02.05.01", "status": "affected", "version": "02.05.00", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eOS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\u003c/p\u003e" } ], "value": "OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 OS Command Injection", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-04-21T09:17:42.907Z", "orgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "shortName": "Hitachi" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "source": { "advisory": "hitachi-sec-2022-307", "discovery": "UNKNOWN" }, "title": "OS Command Injection Vulnerability in RAID Manager Storage Replication Adapter", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "hirt@hitachi.co.jp", "ID": "CVE-2022-34883", "STATE": "PUBLIC", "TITLE": "OS Command Injection Vulnerability in RAID Manager Storage Replication Adapter" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "RAID Manager Storage Replication Adapter", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "02.01.04", "version_value": "02.03.02" }, { "platform": "Windows and Docker", "version_affected": "\u003c", "version_name": "02.05.00", "version_value": "02.05.01" } ] } } ] }, "vendor_name": "Hitachi" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78 OS Command Injection" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2022/2022_307.html", "refsource": "MISC", "url": "https://www.hitachi.co.jp/products/it/storage-solutions/global/sec_info/2022/2022_307.html" } ] }, "source": { "advisory": "hitachi-sec-2022-307", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "50d0f415-c707-4733-9afc-8f6c0e9b3f82", "assignerShortName": "Hitachi", "cveId": "CVE-2022-34883", "datePublished": "2022-09-06T06:30:15", "dateReserved": "2022-06-30T00:00:00", "dateUpdated": "2024-08-03T09:22:10.705Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-09-06 07:15
Modified
2024-11-21 07:10
Severity ?
7.2 (High) - CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hitachi | raid_manager_storage_replication_adapter | * | |
hitachi | raid_manager_storage_replication_adapter | 02.05.00 | |
microsoft | windows | - | |
hitachi | raid_manager_storage_replication_adapter | 02.05.00 | |
docker | docker | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3D76EA4-5A07-43D5-A315-3E2AA5DEE7E3", "versionEndExcluding": "02.03.02", "versionStartIncluding": "02.01.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:02.05.00:*:*:*:*:*:*:*", "matchCriteriaId": "0DCED4B2-6C7F-4DE0-BD91-67D9EA50FFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:02.05.00:*:*:*:*:*:*:*", "matchCriteriaId": "0DCED4B2-6C7F-4DE0-BD91-67D9EA50FFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:docker:docker:-:*:*:*:*:*:*:*", "matchCriteriaId": "231A8A55-A319-4878-91DA-4FD91CF0549E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "OS Command Injection vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to execute arbitrary OS commands. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\n\n" }, { "lang": "es", "value": "Una vulnerabilidad de inyecci\u00f3n de comandos del Sistema Operativo en Hitachi RAID Manager Storage Replication Adapter permite a usuarios remotos autenticados ejecutar comandos arbitrarios del Sistema Operativo. Este problema afecta a: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versiones anteriores a 02.03.02 en Windows; 02.05.00 versiones anteriores a 02.05.01 en Windows y Docker.\n" } ], "id": "CVE-2022-34883", "lastModified": "2024-11-21T07:10:22.017", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "hirt@hitachi.co.jp", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-06T07:15:07.420", "references": [ { "source": "hirt@hitachi.co.jp", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "sourceIdentifier": "hirt@hitachi.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "hirt@hitachi.co.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-06 07:15
Modified
2024-11-21 07:10
Severity ?
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hitachi | raid_manager_storage_replication_adapter | * | |
hitachi | raid_manager_storage_replication_adapter | 02.05.00 | |
microsoft | windows | - | |
hitachi | raid_manager_storage_replication_adapter | 02.05.00 | |
docker | docker | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3D76EA4-5A07-43D5-A315-3E2AA5DEE7E3", "versionEndExcluding": "02.03.02", "versionStartIncluding": "02.01.04", "vulnerable": true }, { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:02.05.00:*:*:*:*:*:*:*", "matchCriteriaId": "0DCED4B2-6C7F-4DE0-BD91-67D9EA50FFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hitachi:raid_manager_storage_replication_adapter:02.05.00:*:*:*:*:*:*:*", "matchCriteriaId": "0DCED4B2-6C7F-4DE0-BD91-67D9EA50FFB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:a:docker:docker:-:*:*:*:*:*:*:*", "matchCriteriaId": "231A8A55-A319-4878-91DA-4FD91CF0549E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information Exposure Through an Error Message vulnerability in Hitachi RAID Manager Storage Replication Adapter allows remote authenticated users to gain sensitive information. This issue affects: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versions prior to 02.03.02 on Windows; 02.05.00 versions prior to 02.05.01 on Windows and Docker.\n\n" }, { "lang": "es", "value": "Una vulnerabilidad de Exposici\u00f3n de Informaci\u00f3n Mediante Mensajes de Error en Hitachi RAID Manager Storage Replication Adapter permite a usuarios remotos autenticados conseguir informaci\u00f3n confidencial. Este problema afecta a: Hitachi RAID Manager Storage Replication Adapter 02.01.04 versiones anteriores a 02.03.02 en Windows; 02.05.00 versiones anteriores a 02.05.01 en Windows y Docker." } ], "id": "CVE-2022-34882", "lastModified": "2024-11-21T07:10:21.873", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.0, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6.0, "source": "hirt@hitachi.co.jp", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-06T07:15:07.247", "references": [ { "source": "hirt@hitachi.co.jp", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.hitachi.com/products/it/storage-solutions/sec_info/2022/2022_307.html" } ], "sourceIdentifier": "hirt@hitachi.co.jp", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "hirt@hitachi.co.jp", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-209" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }