Skip to main content

Hitachi
Contact UsContact Us

June 16, 2025
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2025-306

Vulnerability description

CVE-2025-24063
Kernel Streaming Service Driver Elevation of Privilege Vulnerability
CVE-2025-27468
Windows Kernel-Mode Driver Elevation of Privilege Vulnerability
CVE-2025-29829
Windows Trusted Runtime Interface Driver Information Disclosure Vulnerability
CVE-2025-29830
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29832
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29833
Microsoft Virtual Machine Bus (VMBus) Remote Code Execution Vulnerability
CVE-2025-29835
Windows Remote Access Connection Manager Information Disclosure Vulnerability
CVE-2025-29836
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29837
Windows Installer Information Disclosure Vulnerability
CVE-2025-29839
Windows Multiple UNC Provider Driver Information Disclosure Vulnerability
CVE-2025-29840
Windows Media Remote Code Execution Vulnerability
CVE-2025-29841
Universal Print Management Service Elevation of Privilege Vulnerability
CVE-2025-29842
UrlMon Security Feature Bypass Vulnerability
CVE-2025-29954
Windows Lightweight Directory Access Protocol (LDAP) Denial of Service Vulnerability
CVE-2025-29956
Windows SMB Information Disclosure Vulnerability
CVE-2025-29957
Windows Deployment Services Denial of Service Vulnerability
CVE-2025-29958
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29959
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29960
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29961
Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability
CVE-2025-29962
Windows Media Remote Code Execution Vulnerability
CVE-2025-29963
Windows Media Remote Code Execution Vulnerability
CVE-2025-29964
Windows Media Remote Code Execution Vulnerability
CVE-2025-29966
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2025-29967
Remote Desktop Client Remote Code Execution Vulnerability
CVE-2025-29969
MS-EVEN RPC Remote Code Execution Vulnerability
CVE-2025-29974
Windows Kernel Information Disclosure Vulnerability
CVE-2025-30385
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-30388
Windows Graphics Component Remote Code Execution Vulnerability
CVE-2025-30397
Scripting Engine Memory Corruption Vulnerability
CVE-2025-30400
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2025-32701
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-32706
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-32707
NTFS Elevation of Privilege Vulnerability
CVE-2025-32709
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2025-24063, CVE-2025-27468, CVE-2025-29829, CVE-2025-29830,
CVE-2025-29832, CVE-2025-29833, CVE-2025-29835, CVE-2025-29836,
CVE-2025-29837, CVE-2025-29839, CVE-2025-29840, CVE-2025-29842,
CVE-2025-29954, CVE-2025-29956, CVE-2025-29957, CVE-2025-29958,
CVE-2025-29959, CVE-2025-29960, CVE-2025-29961, CVE-2025-29962,
CVE-2025-29963, CVE-2025-29964, CVE-2025-29966, CVE-2025-29967,
CVE-2025-29969, CVE-2025-29974, CVE-2025-30385, CVE-2025-30388,
CVE-2025-30397, CVE-2025-30400, CVE-2025-32701, CVE-2025-32706,
CVE-2025-32707, CVE-2025-32709

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2025-24063, CVE-2025-27468, CVE-2025-29829, CVE-2025-29830,
CVE-2025-29832, CVE-2025-29833, CVE-2025-29835, CVE-2025-29836,
CVE-2025-29837, CVE-2025-29839, CVE-2025-29840, CVE-2025-29841,
CVE-2025-29842, CVE-2025-29954, CVE-2025-29956, CVE-2025-29957,
CVE-2025-29958, CVE-2025-29959, CVE-2025-29960, CVE-2025-29961,
CVE-2025-29962, CVE-2025-29963, CVE-2025-29964, CVE-2025-29966,
CVE-2025-29967, CVE-2025-29969, CVE-2025-29974, CVE-2025-30385,
CVE-2025-30388, CVE-2025-30397, CVE-2025-30400, CVE-2025-32701,
CVE-2025-32706, CVE-2025-32709
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2025-24063, CVE-2025-27468, CVE-2025-29829, CVE-2025-29830,
CVE-2025-29832, CVE-2025-29833, CVE-2025-29835, CVE-2025-29836,
CVE-2025-29837, CVE-2025-29839, CVE-2025-29840, CVE-2025-29842,
CVE-2025-29954, CVE-2025-29956, CVE-2025-29957, CVE-2025-29958,
CVE-2025-29959, CVE-2025-29960, CVE-2025-29961, CVE-2025-29962,
CVE-2025-29966, CVE-2025-29967, CVE-2025-29969, CVE-2025-29974,
CVE-2025-30385, CVE-2025-30388, CVE-2025-30397, CVE-2025-32701,
CVE-2025-32706, CVE-2025-32707, CVE-2025-32709

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • June 16, 2025: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.