Skip to main content

Hitachi
Contact UsContact Us

March 22, 2024
Hitachi, Ltd. IT Platform Products Management Division

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2024-302

Vulnerability description

CVE-2024-21304
Trusted Compute Base Elevation of Privilege Vulnerability
CVE-2024-21315
Microsoft Defender for Endpoint Protection Elevation of Privilege Vulnerability
CVE-2024-21338
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21339
Windows USB Generic Parent Driver Remote Code Execution Vulnerability
CVE-2024-21340
Windows Kernel Information Disclosure Vulnerability
CVE-2024-21341
Windows Kernel Remote Code Execution Vulnerability
CVE-2024-21343
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-21344
Windows Network Address Translation (NAT) Denial of Service Vulnerability
CVE-2024-21347
Microsoft ODBC Driver Remote Code Execution Vulnerability
CVE-2024-21348
Internet Connection Sharing (ICS) Denial of Service Vulnerability
CVE-2024-21349
Microsoft ActiveX Data Objects Remote Code Execution Vulnerability
CVE-2024-21350
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21351
Windows SmartScreen Security Feature Bypass Vulnerability
CVE-2024-21352
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21354
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2024-21355
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2024-21356
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2024-21357
Windows Pragmatic General Multicast (PGM) Remote Code Execution Vulnerability
CVE-2024-21358
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21359
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21360
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21361
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21362
Windows Kernel Security Feature Bypass Vulnerability
CVE-2024-21363
Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability
CVE-2024-21365
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21366
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21367
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21368
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21369
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21370
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21371
Windows Kernel Elevation of Privilege Vulnerability
CVE-2024-21372
Windows OLE Remote Code Execution Vulnerability
CVE-2024-21375
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21377
Windows DNS Information Disclosure Vulnerability
CVE-2024-21391
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability
CVE-2024-21405
Microsoft Message Queuing (MSMQ) Elevation of Privilege Vulnerability
CVE-2024-21406
Windows Printing Service Spoofing Vulnerability
CVE-2024-21412
Internet Shortcut Files Security Feature Bypass Vulnerability
CVE-2024-21420
Microsoft WDAC OLE DB provider for SQL Server Remote Code Execution Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2024-21304, CVE-2024-21338, CVE-2024-21339, CVE-2024-21340,
CVE-2024-21341, CVE-2024-21343, CVE-2024-21344, CVE-2024-21347,
CVE-2024-21348, CVE-2024-21349, CVE-2024-21350, CVE-2024-21351,
CVE-2024-21352, CVE-2024-21354, CVE-2024-21355, CVE-2024-21356,
CVE-2024-21357, CVE-2024-21358, CVE-2024-21359, CVE-2024-21360,
CVE-2024-21361, CVE-2024-21362, CVE-2024-21363, CVE-2024-21365,
CVE-2024-21366, CVE-2024-21367, CVE-2024-21368, CVE-2024-21369,
CVE-2024-21370, CVE-2024-21371, CVE-2024-21372, CVE-2024-21375,
CVE-2024-21377, CVE-2024-21391, CVE-2024-21405, CVE-2024-21406,
CVE-2024-21412, CVE-2024-21420

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2024-21304, CVE-2024-21338, CVE-2024-21339, CVE-2024-21340,
CVE-2024-21341, CVE-2024-21343, CVE-2024-21344, CVE-2024-21347,
CVE-2024-21348, CVE-2024-21349, CVE-2024-21350, CVE-2024-21351,
CVE-2024-21352, CVE-2024-21354, CVE-2024-21355, CVE-2024-21356,
CVE-2024-21357, CVE-2024-21358, CVE-2024-21359, CVE-2024-21360,
CVE-2024-21361, CVE-2024-21362, CVE-2024-21363, CVE-2024-21365,
CVE-2024-21366, CVE-2024-21367, CVE-2024-21368, CVE-2024-21369,
CVE-2024-21370, CVE-2024-21371, CVE-2024-21372, CVE-2024-21375,
CVE-2024-21377, CVE-2024-21391, CVE-2024-21405, CVE-2024-21406,
CVE-2024-21412, CVE-2024-21420
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2024-21340, CVE-2024-21343, CVE-2024-21344, CVE-2024-21347,
CVE-2024-21348, CVE-2024-21349, CVE-2024-21350, CVE-2024-21351,
CVE-2024-21352, CVE-2024-21354, CVE-2024-21355, CVE-2024-21356,
CVE-2024-21357, CVE-2024-21358, CVE-2024-21359, CVE-2024-21360,
CVE-2024-21361, CVE-2024-21362, CVE-2024-21363, CVE-2024-21365,
CVE-2024-21366, CVE-2024-21367, CVE-2024-21368, CVE-2024-21369,
CVE-2024-21370, CVE-2024-21371, CVE-2024-21372, CVE-2024-21375,
CVE-2024-21377, CVE-2024-21391, CVE-2024-21405, CVE-2024-21406,
CVE-2024-21420

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage VM
  • Hitachi Unified Storage 100
  • Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage
  • Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform
  • Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • March 22, 2024: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.