Skip to main content

Hitachi
Contact UsContact Us

November 7, 2023
Hitachi, Ltd. IT Platform Products Management Division

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

Hitachi-sec-2023-310

Vulnerability description

CVE-2023-35349
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36431
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36434
Windows IIS Server Elevation of Privilege Vulnerability
CVE-2023-36436
Windows MSHTML Platform Remote Code Execution Vulnerability
CVE-2023-36438
Windows TCP/IP Information Disclosure Vulnerability
CVE-2023-36557
Print HTML API Remote Code Execution Vulnerability
CVE-2023-36563
Microsoft WordPad Information Disclosure Vulnerability
CVE-2023-36564
Windows Search Security Feature Bypass Vulnerability
CVE-2023-36567
Windows Deployment Services Information Disclosure Vulnerability
CVE-2023-36570
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36571
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36572
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36573
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36574
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36575
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36576
Windows Kernel Information Disclosure Vulnerability
CVE-2023-36577
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2023-36578
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36579
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36581
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36582
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36583
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36584
Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2023-36585
Active Template Library Denial of Service Vulnerability
CVE-2023-36589
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36590
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36591
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36592
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36593
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36594
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-36596
Remote Procedure Call Information Disclosure Vulnerability
CVE-2023-36598
Microsoft WDAC ODBC Driver Remote Code Execution Vulnerability
CVE-2023-36602
Windows TCP/IP Denial of Service Vulnerability
CVE-2023-36603
Windows TCP/IP Denial of Service Vulnerability
CVE-2023-36605
Windows Named Pipe Filesystem Elevation of Privilege Vulnerability
CVE-2023-36606
Microsoft Message Queuing Denial of Service Vulnerability
CVE-2023-36697
Microsoft Message Queuing Remote Code Execution Vulnerability
CVE-2023-36698
Windows Kernel Security Feature Bypass Vulnerability
CVE-2023-36701
Microsoft Resilient File System (Re FS) Elevation of Privilege Vulnerability
CVE-2023-36702
Microsoft DirectMusic Remote Code Execution Vulnerability
CVE-2023-36704
Windows Setup Files Cleanup Remote Code Execution Vulnerability
CVE-2023-36709
Microsoft AllJoyn API Denial of Service Vulnerability
CVE-2023-36710
Windows Media Foundation Core Remote Code Execution Vulnerability
CVE-2023-36711
Windows Runtime C++ Template Library Elevation of Privilege Vulnerability
CVE-2023-36712
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36713
Windows Common Log File System Driver Information Disclosure Vulnerability
CVE-2023-36717
Windows Virtual Trusted Platform Module Denial of Service Vulnerability
CVE-2023-36718
Microsoft Virtual Trusted Platform Module Remote Code Execution Vulnerability
CVE-2023-36720
Windows Mixed Reality Developer Tools Denial of Service Vulnerability
CVE-2023-36721
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2023-36722
Active Directory Domain Services Information Disclosure Vulnerability
CVE-2023-36723
Windows Container Manager Service Elevation of Privilege Vulnerability
CVE-2023-36724
Windows Power Management Service Information Disclosure Vulnerability
CVE-2023-36725
Windows Kernel Elevation of Privilege Vulnerability
CVE-2023-36726
Windows Internet Key Exchange (IKE) Extension Elevation of Privilege Vulnerability
CVE-2023-36729
Named Pipe File System Elevation of Privilege Vulnerability
CVE-2023-36731
Win32k Elevation of Privilege Vulnerability
CVE-2023-36732
Win32k Elevation of Privilege Vulnerability
CVE-2023-36743
Win32k Elevation of Privilege Vulnerability
CVE-2023-36776
Win32k Elevation of Privilege Vulnerability
CVE-2023-36902
Windows Runtime Remote Code Execution Vulnerability
CVE-2023-38159
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2023-38166
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41765
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41766
Windows Client Server Run-time Subsystem (CSRSS) Elevation of Privilege Vulnerability
CVE-2023-41767
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41768
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41769
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41770
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41771
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41772
Win32k Elevation of Privilege Vulnerability
CVE-2023-41773
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-41774
Layer 2 Tunneling Protocol Remote Code Execution Vulnerability
CVE-2023-44487
MITRE: CVE-2023-44487 HTTP/2 Rapid Reset Attack

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2023-35349, CVE-2023-36431, CVE-2023-36434, CVE-2023-36436,
CVE-2023-36438, CVE-2023-36557, CVE-2023-36563, CVE-2023-36564,
CVE-2023-36567, CVE-2023-36570, CVE-2023-36571, CVE-2023-36572,
CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36576,
CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581,
CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585,
CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592,
CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36598,
CVE-2023-36602, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606,
CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702,
CVE-2023-36704, CVE-2023-36709, CVE-2023-36710, CVE-2023-36711,
CVE-2023-36712, CVE-2023-36713, CVE-2023-36717, CVE-2023-36718,
CVE-2023-36720, CVE-2023-36721, CVE-2023-36722, CVE-2023-36723,
CVE-2023-36724, CVE-2023-36725, CVE-2023-36726, CVE-2023-36729,
CVE-2023-36731, CVE-2023-36732, CVE-2023-36743, CVE-2023-36776,
CVE-2023-36902, CVE-2023-38159, CVE-2023-38166, CVE-2023-41765,
CVE-2023-41766, CVE-2023-41767, CVE-2023-41768, CVE-2023-41769,
CVE-2023-41770, CVE-2023-41771, CVE-2023-41772, CVE-2023-41773,
CVE-2023-41774, CVE-2023-44487

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2023-35349, CVE-2023-36431, CVE-2023-36434, CVE-2023-36436,
CVE-2023-36438, CVE-2023-36557, CVE-2023-36563, CVE-2023-36564,
CVE-2023-36567, CVE-2023-36570, CVE-2023-36571, CVE-2023-36572,
CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36576,
CVE-2023-36577, CVE-2023-36578, CVE-2023-36579, CVE-2023-36581,
CVE-2023-36582, CVE-2023-36583, CVE-2023-36584, CVE-2023-36585,
CVE-2023-36589, CVE-2023-36590, CVE-2023-36591, CVE-2023-36592,
CVE-2023-36593, CVE-2023-36594, CVE-2023-36596, CVE-2023-36598,
CVE-2023-36602, CVE-2023-36603, CVE-2023-36605, CVE-2023-36606,
CVE-2023-36697, CVE-2023-36698, CVE-2023-36701, CVE-2023-36702,
CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712,
CVE-2023-36713, CVE-2023-36717, CVE-2023-36718, CVE-2023-36720,
CVE-2023-36721, CVE-2023-36722, CVE-2023-36723, CVE-2023-36724,
CVE-2023-36725, CVE-2023-36726, CVE-2023-36729, CVE-2023-36731,
CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, CVE-2023-36902,
CVE-2023-38159, CVE-2023-38166, CVE-2023-41765, CVE-2023-41766,
CVE-2023-41767, CVE-2023-41768, CVE-2023-41769, CVE-2023-41770,
CVE-2023-41771, CVE-2023-41772, CVE-2023-41773, CVE-2023-41774,
CVE-2023-44487
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2023-35349, CVE-2023-36431, CVE-2023-36434, CVE-2023-36436,
CVE-2023-36438, CVE-2023-36557, CVE-2023-36563, CVE-2023-36564,
CVE-2023-36567, CVE-2023-36570, CVE-2023-36571, CVE-2023-36572,
CVE-2023-36573, CVE-2023-36574, CVE-2023-36575, CVE-2023-36577,
CVE-2023-36578, CVE-2023-36579, CVE-2023-36581, CVE-2023-36582,
CVE-2023-36583, CVE-2023-36584, CVE-2023-36585, CVE-2023-36589,
CVE-2023-36590, CVE-2023-36591, CVE-2023-36592, CVE-2023-36593,
CVE-2023-36594, CVE-2023-36596, CVE-2023-36598, CVE-2023-36602,
CVE-2023-36606, CVE-2023-36697, CVE-2023-36701, CVE-2023-36702,
CVE-2023-36709, CVE-2023-36710, CVE-2023-36711, CVE-2023-36712,
CVE-2023-36713, CVE-2023-36717, CVE-2023-36718, CVE-2023-36722,
CVE-2023-36724, CVE-2023-36726, CVE-2023-36729, CVE-2023-36731,
CVE-2023-36732, CVE-2023-36743, CVE-2023-36776, CVE-2023-38159,
CVE-2023-38166, CVE-2023-41765, CVE-2023-41766, CVE-2023-41767,
CVE-2023-41768, CVE-2023-41769, CVE-2023-41770, CVE-2023-41771,
CVE-2023-41773, CVE-2023-41774

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • November 7, 2023: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.