Skip to main content

Hitachi
Contact UsContact Us

June 6, 2025
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2025-304

Vulnerability description

CVE-2025-21191
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVE-2025-21197
Windows NTFS Information Disclosure Vulnerability
CVE-2025-21204
Windows Process Activation Elevation of Privilege Vulnerability
CVE-2025-21205
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-21221
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-21222
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-24058
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-24060
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-24062
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-24073
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-24074
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-26635
Windows Hello Security Feature Bypass Vulnerability
CVE-2025-26637
BitLocker Security Feature Bypass Vulnerability
CVE-2025-26639
Windows USB Print Driver Elevation of Privilege Vulnerability
CVE-2025-26640
Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-26641
Microsoft Message Queuing (MSMQ) Denial of Service Vulnerability
CVE-2025-26644
Windows Hello Spoofing Vulnerability
CVE-2025-26648
Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-26663
Windows Lightweight Directory Access Protocol (LDAP) Remote Code Execution Vulnerability
CVE-2025-26665
Windows upnphost.dll Elevation of Privilege Vulnerability
CVE-2025-26666
Windows Media Remote Code Execution Vulnerability
CVE-2025-26668
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-26669
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-26670
Lightweight Directory Access Protocol (LDAP) Client Remote Code Execution Vulnerability
CVE-2025-26672
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-26673
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2025-26674
Windows Media Remote Code Execution Vulnerability
CVE-2025-26675
Windows Subsystem for Linux Elevation of Privilege Vulnerability
CVE-2025-26678
Windows Defender Application Control Security Feature Bypass Vulnerability
CVE-2025-26679
RPC Endpoint Mapper Service Elevation of Privilege Vulnerability
CVE-2025-26681
Win32k Elevation of Privilege Vulnerability
CVE-2025-26686
Windows TCP/IP Remote Code Execution Vulnerability
CVE-2025-26687
Win32k Elevation of Privilege Vulnerability
CVE-2025-26688
Microsoft Virtual Hard Disk Elevation of Privilege Vulnerability
CVE-2025-27467
Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-27469
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2025-27471
Microsoft Streaming Service Denial of Service Vulnerability
CVE-2025-27472
Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2025-27473
HTTP.sys Denial of Service Vulnerability
CVE-2025-27476
Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-27477
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-27478
Windows Local Security Authority (LSA) Elevation of Privilege Vulnerability
CVE-2025-27481
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-27483
NTFS Elevation of Privilege Vulnerability
CVE-2025-27484
Windows Universal Plug and Play (UPnP) Device Host Elevation of Privilege Vulnerability
CVE-2025-27487
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2025-27490
Windows Bluetooth Service Elevation of Privilege Vulnerability
CVE-2025-27491
Windows Hyper-V Remote Code Execution Vulnerability
CVE-2025-27727
Windows Installer Elevation of Privilege Vulnerability
CVE-2025-27729
Windows Shell Remote Code Execution Vulnerability
CVE-2025-27730
Windows Digital Media Elevation of Privilege Vulnerability
CVE-2025-27731
Microsoft OpenSSH for Windows Elevation of Privilege Vulnerability
CVE-2025-27732
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2025-27733
NTFS Elevation of Privilege Vulnerability
CVE-2025-27735
Windows Virtualization-Based Security (VBS) Security Feature Bypass Vulnerability
CVE-2025-27736
Windows Power Dependency Coordinator Information Disclosure Vulnerability
CVE-2025-27737
Windows Security Zone Mapping Security Feature Bypass Vulnerability
CVE-2025-27738
Windows Resilient File System (ReFS) Information Disclosure Vulnerability
CVE-2025-27739
Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-27741
NTFS Elevation of Privilege Vulnerability
CVE-2025-27742
NTFS Information Disclosure Vulnerability
CVE-2025-29809
Windows Kerberos Security Feature Bypass Vulnerability
CVE-2025-29810
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2025-29824
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2024-9157
Synaptics: CVE-2024-9157 Synaptics Service Binaries DLL Loading Vulnerability
CVE-2025-21180
Windows exFAT File System Remote Code Execution Vulnerability
CVE-2025-21247
MapUrlToZone Security Feature Bypass Vulnerability
CVE-2025-24035
Windows Remote Desktop Services Remote Code Execution Vulnerability
CVE-2025-24044
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2025-24046
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24048
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2025-24050
Windows Hyper-V Elevation of Privilege Vulnerability
CVE-2025-24051
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-24054
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-24055
Windows USB Video Class System Driver Information Disclosure Vulnerability
CVE-2025-24056
Windows Telephony Service Remote Code Execution Vulnerability
CVE-2025-24059
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-24061
Windows Mark of the Web Security Feature Bypass Vulnerability
CVE-2025-24066
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24067
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-24071
Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2025-24072
Microsoft Local Security Authority (LSA) Server Elevation of Privilege Vulnerability
CVE-2025-24983
Windows Win32 Kernel Subsystem Elevation of Privilege Vulnerability
CVE-2025-24984
Windows NTFS Information Disclosure Vulnerability
CVE-2025-24985
Windows Fast FAT File System Driver Remote Code Execution Vulnerability
CVE-2025-24987
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2025-24988
Windows USB Video Class System Driver Elevation of Privilege Vulnerability
CVE-2025-24991
Windows NTFS Information Disclosure Vulnerability
CVE-2025-24992
Windows NTFS Information Disclosure Vulnerability
CVE-2025-24993
Windows NTFS Remote Code Execution Vulnerability
CVE-2025-24995
Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability
CVE-2025-24996
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2025-24997
DirectX Graphics Kernel File Denial of Service Vulnerability
CVE-2025-26633
Microsoft Management Console Security Feature Bypass Vulnerability
CVE-2025-26645
Remote Desktop Client Remote Code Execution Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2025-21191, CVE-2025-21197, CVE-2025-21204, CVE-2025-21205,
CVE-2025-21221, CVE-2025-21222, CVE-2025-24058, CVE-2025-24060,
CVE-2025-24073, CVE-2025-24074, CVE-2025-26635, CVE-2025-26637,
CVE-2025-26640, CVE-2025-26641, CVE-2025-26644, CVE-2025-26648,
CVE-2025-26663, CVE-2025-26665, CVE-2025-26666, CVE-2025-26668,
CVE-2025-26669, CVE-2025-26670, CVE-2025-26672, CVE-2025-26673,
CVE-2025-26674, CVE-2025-26678, CVE-2025-26679, CVE-2025-26686,
CVE-2025-26687, CVE-2025-26688, CVE-2025-27467, CVE-2025-27469,
CVE-2025-27471, CVE-2025-27473, CVE-2025-27476, CVE-2025-27477,
CVE-2025-27478, CVE-2025-27481, CVE-2025-27483, CVE-2025-27484,
CVE-2025-27487, CVE-2025-27491, CVE-2025-27727, CVE-2025-27730,
CVE-2025-27731, CVE-2025-27732, CVE-2025-27733, CVE-2025-27735,
CVE-2025-27736, CVE-2025-27737, CVE-2025-27738, CVE-2025-27739,
CVE-2025-27741, CVE-2025-27742, CVE-2025-29809, CVE-2025-29810,
CVE-2025-29824, CVE-2024-9157, CVE-2025-21180, CVE-2025-21247,
CVE-2025-24035, CVE-2025-24044, CVE-2025-24046, CVE-2025-24048,
CVE-2025-24050, CVE-2025-24051, CVE-2025-24054, CVE-2025-24055,
CVE-2025-24056, CVE-2025-24059, CVE-2025-24061, CVE-2025-24066,
CVE-2025-24067, CVE-2025-24071, CVE-2025-24072, CVE-2025-24984,
CVE-2025-24985, CVE-2025-24987, CVE-2025-24988, CVE-2025-24991,
CVE-2025-24992, CVE-2025-24993, CVE-2025-24995, CVE-2025-24996,
CVE-2025-26633, CVE-2025-26645

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2025-21191, CVE-2025-21197, CVE-2025-21204, CVE-2025-21205,
CVE-2025-21221, CVE-2025-21222, CVE-2025-24058, CVE-2025-24060,
CVE-2025-24062, CVE-2025-24073, CVE-2025-24074, CVE-2025-26635,
CVE-2025-26637, CVE-2025-26639, CVE-2025-26640, CVE-2025-26641,
CVE-2025-26644, CVE-2025-26648, CVE-2025-26663, CVE-2025-26665,
CVE-2025-26666, CVE-2025-26668, CVE-2025-26669, CVE-2025-26670,
CVE-2025-26672, CVE-2025-26673, CVE-2025-26674, CVE-2025-26675,
CVE-2025-26678, CVE-2025-26679, CVE-2025-26681, CVE-2025-26686,
CVE-2025-26687, CVE-2025-26688, CVE-2025-27467, CVE-2025-27469,
CVE-2025-27471, CVE-2025-27473, CVE-2025-27476, CVE-2025-27477,
CVE-2025-27478, CVE-2025-27481, CVE-2025-27484, CVE-2025-27487,
CVE-2025-27490, CVE-2025-27491, CVE-2025-27727, CVE-2025-27729,
CVE-2025-27730, CVE-2025-27731, CVE-2025-27732, CVE-2025-27735,
CVE-2025-27736, CVE-2025-27737, CVE-2025-27738, CVE-2025-27739,
CVE-2025-27742, CVE-2025-29809, CVE-2025-29810, CVE-2025-29824,
CVE-2024-9157, CVE-2025-21180, CVE-2025-21247, CVE-2025-24035,
CVE-2025-24044, CVE-2025-24046, CVE-2025-24048, CVE-2025-24050,
CVE-2025-24051, CVE-2025-24054, CVE-2025-24055, CVE-2025-24056,
CVE-2025-24059, CVE-2025-24061, CVE-2025-24066, CVE-2025-24067,
CVE-2025-24071, CVE-2025-24072, CVE-2025-24984, CVE-2025-24985,
CVE-2025-24987, CVE-2025-24988, CVE-2025-24991, CVE-2025-24992,
CVE-2025-24993, CVE-2025-24995, CVE-2025-24996, CVE-2025-24997,
CVE-2025-26633, CVE-2025-26645
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2025-21191, CVE-2025-21197, CVE-2025-21204, CVE-2025-21205,
CVE-2025-21221, CVE-2025-21222, CVE-2025-24073, CVE-2025-26637,
CVE-2025-26641, CVE-2025-26648, CVE-2025-26663, CVE-2025-26665,
CVE-2025-26668, CVE-2025-26669, CVE-2025-26670, CVE-2025-26672,
CVE-2025-26673, CVE-2025-26679, CVE-2025-26686, CVE-2025-26687,
CVE-2025-26688, CVE-2025-27469, CVE-2025-27471, CVE-2025-27472,
CVE-2025-27473, CVE-2025-27477, CVE-2025-27478, CVE-2025-27481,
CVE-2025-27483, CVE-2025-27484, CVE-2025-27487, CVE-2025-27491,
CVE-2025-27727, CVE-2025-27732, CVE-2025-27733, CVE-2025-27735,
CVE-2025-27737, CVE-2025-27738, CVE-2025-27741, CVE-2025-27742,
CVE-2025-29809, CVE-2025-29810, CVE-2025-29824, CVE-2024-9157,
CVE-2025-21180, CVE-2025-21247, CVE-2025-24035, CVE-2025-24044,
CVE-2025-24046, CVE-2025-24051, CVE-2025-24054, CVE-2025-24055,
CVE-2025-24056, CVE-2025-24059, CVE-2025-24061, CVE-2025-24066,
CVE-2025-24067, CVE-2025-24071, CVE-2025-24072, CVE-2025-24983,
CVE-2025-24984, CVE-2025-24985, CVE-2025-24987, CVE-2025-24988,
CVE-2025-24991, CVE-2025-24992, CVE-2025-24993, CVE-2025-24995,
CVE-2025-24996, CVE-2025-26633, CVE-2025-26645

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • June 6, 2025: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.