Skip to main content

Hitachi
Contact UsContact Us

September 21, 2023
Hitachi, Ltd. IT Platform Products Management Division

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

Hitachi-sec-2023-304

Vulnerability description

CVE-2023-21554
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-21727
Remote Procedure Call Runtime Remote Code Execution Vulnerability
CVE-2023-21729
Remote Procedure Call Runtime Information Disclosure Vulnerability
CVE-2023-21769
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-24883
Microsoft PostScript and PCL6 Class Printer Driver Information Disclosure Vulnerability
CVE-2023-24884
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24885
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24886
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24887
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24912
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-24924
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24925
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24926
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24927
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24928
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24929
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-24931
Windows Secure Channel Denial of Service Vulnerability
CVE-2023-28216
Windows Advanced Local Procedure Call (ALPC) Elevation of Privilege Vulnerability
CVE-2023-28217
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2023-28218
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2023-28219
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-28220
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-28221
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-28222
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28224
Windows Point-to-Point Protocol over Ethernet (PPP o E) Remote Code Execution Vulnerability
CVE-2023-28225
Windows NTLM Elevation of Privilege Vulnerability
CVE-2023-28226
Windows Enroll Engine Security Feature Bypass Vulnerability
CVE-2023-28227
Windows Bluetooth Driver Remote Code Execution Vulnerability
CVE-2023-28228
Windows Spoofing Vulnerability
CVE-2023-28229
Windows CNG Key Isolation Service Elevation of Privilege Vulnerability
CVE-2023-28232
Windows Point-to-Point Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-28235
Windows Lock Screen Security Feature Bypass Vulnerability
CVE-2023-28236
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28237
Windows Kernel Remote Code Execution Vulnerability
CVE-2023-28238
Windows Internet Key Exchange (IKE) Protocol Extensions Remote Code Execution Vulnerability
CVE-2023-28241
Windows Secure Socket Tunneling Protocol (SSTP) Denial of Service Vulnerability
CVE-2023-28243
Microsoft PostScript and PCL6 Class Printer Driver Remote Code Execution Vulnerability
CVE-2023-28248
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28249
Windows Boot Manager Security Feature Bypass Vulnerability
CVE-2023-28250
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2023-28252
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2023-28253
Windows Kernel Information Disclosure Vulnerability
CVE-2023-28266
Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2023-28267
Remote Desktop Protocol Client Information Disclosure Vulnerability
CVE-2023-28269
Windows Boot Manager Security Feature Bypass Vulnerability
CVE-2023-28270
Windows Lock Screen Security Feature Bypass Vulnerability
CVE-2023-28271
Windows Kernel Memory Information Disclosure Vulnerability
CVE-2023-28272
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28273
Windows Clip Service Elevation of Privilege Vulnerability
CVE-2023-28274
Windows Win32k Elevation of Privilege Vulnerability
CVE-2023-28275
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-28276
Windows Group Policy Security Feature Bypass Vulnerability
CVE-2023-28293
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-28298
Windows Kernel Denial of Service Vulnerability
CVE-2023-28302
Microsoft Message Queuing Denial of Service Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID
CVE-2023-21554, CVE-2023-21727, CVE-2023-21729, CVE-2023-21769,
CVE-2023-24883, CVE-2023-24884, CVE-2023-24885, CVE-2023-24886,
CVE-2023-24887, CVE-2023-24912, CVE-2023-24924, CVE-2023-24925,
CVE-2023-24926, CVE-2023-24927, CVE-2023-24928, CVE-2023-24929,
CVE-2023-24931, CVE-2023-28216, CVE-2023-28217, CVE-2023-28218,
CVE-2023-28219, CVE-2023-28220, CVE-2023-28221, CVE-2023-28222,
CVE-2023-28224, CVE-2023-28225, CVE-2023-28226, CVE-2023-28227,
CVE-2023-28228, CVE-2023-28229, CVE-2023-28232, CVE-2023-28235,
CVE-2023-28236, CVE-2023-28237, CVE-2023-28238, CVE-2023-28241,
CVE-2023-28243, CVE-2023-28248, CVE-2023-28249, CVE-2023-28250,
CVE-2023-28252, CVE-2023-28253, CVE-2023-28266, CVE-2023-28267,
CVE-2023-28269, CVE-2023-28270, CVE-2023-28271, CVE-2023-28272,
CVE-2023-28273, CVE-2023-28274, CVE-2023-28275, CVE-2023-28276,
CVE-2023-28293, CVE-2023-28298, CVE-2023-28302
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2023-21554, CVE-2023-21727, CVE-2023-21729, CVE-2023-21769,
CVE-2023-24883, CVE-2023-24884, CVE-2023-24885, CVE-2023-24886,
CVE-2023-24887, CVE-2023-24912, CVE-2023-24924, CVE-2023-24925,
CVE-2023-24926, CVE-2023-24927, CVE-2023-24928, CVE-2023-24929,
CVE-2023-24931, CVE-2023-28216, CVE-2023-28217, CVE-2023-28218,
CVE-2023-28219, CVE-2023-28220, CVE-2023-28221, CVE-2023-28222,
CVE-2023-28224, CVE-2023-28225, CVE-2023-28226, CVE-2023-28227,
CVE-2023-28228, CVE-2023-28229, CVE-2023-28232, CVE-2023-28236,
CVE-2023-28237, CVE-2023-28238, CVE-2023-28241, CVE-2023-28243,
CVE-2023-28249, CVE-2023-28250, CVE-2023-28252, CVE-2023-28253,
CVE-2023-28266, CVE-2023-28267, CVE-2023-28269, CVE-2023-28271,
CVE-2023-28272, CVE-2023-28275, CVE-2023-28276, CVE-2023-28293,
CVE-2023-28298, CVE-2023-28302

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • September 21, 2023: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.