Skip to main content

Hitachi

Update: February 25, 2026

Vulnerability exists in Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager (CVE-2025-5781).

Security Information ID

hitachi-sec-2026-111

Vulnerability description

Hitachi Configuration Manager and Hitachi Ops Center API Configuration Manager contain a vulnerability (CVE-2025-5781) that may allow session tokens to be stored.


Affected products and versions are listed below. Please upgrade your version to the appropriate version.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: Hitachi Device Manager(*1)

Version(s):

Windows, Linux
8.4.1-00 or more and less than 8.6.5-00

Product name: Hitachi Configuration Manager (Japanese version)

Version(s):

Windows, Linux
8.5.1-00 or more and less than 11.0.5-00

Product name: Hitachi Configuration Manager (English version)

Version(s):

Windows, Linux
8.5.1-00 or more

Product name: Hitachi Ops Center API Configuration Manager (English version)

Version(s):

Windows, Linux
10.0.0-00 or more and less than 11.0.5-00

Fixed products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the fixed product.

Version:

Platform
Gives the fixed version.

Scheduled version:

Platform
Gives the fixed version scheduled to be released.

Product name: Hitachi Configuration Manager (Japanese version)

Version(s):

Windows, Linux
11.0.5-00

Product name: Hitachi Ops Center API Configuration Manager (English version)

Version(s):

Windows, Linux
11.0.5-00
*1
Hitachi Device Manager (version 8.4.1-00 or more and less than 8.6.5-00) include Hitachi Configuration Manager as part of the REST API functionality and are impacted by this vulnerability. Mitigation requires upgrading to Hitachi Configuration Manager 11.0.5-00 or later. Alternatively, if the REST API functionality is not needed, it is recommended to uninstall Hitachi Configuration Manager.

Workarounds

None.

Revision history

February 25, 2026
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.