Skip to main content

Hitachi
Contact UsContact Us

December 22, 2025
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2025-312

Vulnerability description

CVE-2025-55248
.NET, .NET Framework, and Visual Studio Information Disclosure Vulnerability
CVE-2025-59505
Windows Smart Card Reader Elevation of Privilege Vulnerability
CVE-2025-59506
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-59507
Windows Speech Runtime Elevation of Privilege Vulnerability
CVE-2025-59508
Windows Speech Recognition Elevation of Privilege Vulnerability
CVE-2025-59509
Windows Speech Recognition Information Disclosure Vulnerability
CVE-2025-59510
Windows Routing and Remote Access Service (RRAS) Denial of Service Vulnerability
CVE-2025-59511
Windows WLAN Service Elevation of Privilege Vulnerability
CVE-2025-59512
Customer Experience Improvement Program (CEIP) Elevation of Privilege Vulnerability
CVE-2025-59513
Windows Bluetooth RFCOM Protocol Driver Information Disclosure Vulnerability
CVE-2025-59514
Microsoft Streaming Service Proxy Elevation of Privilege Vulnerability
CVE-2025-59515
Windows Broadcast DVR User Service Elevation of Privilege Vulnerability
CVE-2025-60703
Windows Remote Desktop Services Elevation of Privilege Vulnerability
CVE-2025-60704
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2025-60705
Windows Client-Side Caching Elevation of Privilege Vulnerability
CVE-2025-60706
Windows Hyper-V Information Disclosure Vulnerability
CVE-2025-60707
Multimedia Class Scheduler Service (MMCSS) Driver Elevation of Privilege Vulnerability
CVE-2025-60708
Storvsp.sys Driver Denial of Service Vulnerability
CVE-2025-60709
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2025-60714
Windows OLE Remote Code Execution Vulnerability
CVE-2025-60715
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2025-60716
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2025-60717
Windows Broadcast DVR User Service Elevation of Privilege Vulnerability
CVE-2025-60719
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-60720
Windows Transport Driver Interface (TDI) Translation Driver Elevation of Privilege Vulnerability
CVE-2025-60723
DirectX Graphics Kernel Denial of Service Vulnerability
CVE-2025-60724
GDI+ Remote Code Execution Vulnerability
CVE-2025-62208
Windows License Manager Information Disclosure Vulnerability
CVE-2025-62209
Windows License Manager Information Disclosure Vulnerability
CVE-2025-62213
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-62215
Windows Kernel Elevation of Privilege Vulnerability
CVE-2025-62217
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2025-62218
Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability
CVE-2025-62219
Microsoft Wireless Provisioning System Elevation of Privilege Vulnerability
CVE-2025-62452
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2025-55248, CVE-2025-59505, CVE-2025-59506, CVE-2025-59507,
CVE-2025-59508, CVE-2025-59509, CVE-2025-59510, CVE-2025-59511,
CVE-2025-59512, CVE-2025-59513, CVE-2025-59514, CVE-2025-59515,
CVE-2025-60703, CVE-2025-60704, CVE-2025-60705, CVE-2025-60706,
CVE-2025-60707, CVE-2025-60708, CVE-2025-60709, CVE-2025-60714,
CVE-2025-60715, CVE-2025-60716, CVE-2025-60717, CVE-2025-60719,
CVE-2025-60720, CVE-2025-60723, CVE-2025-60724, CVE-2025-62208,
CVE-2025-62209, CVE-2025-62213, CVE-2025-62215, CVE-2025-62217,
CVE-2025-62218, CVE-2025-62219, CVE-2025-62452

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2025-55248, CVE-2025-59505, CVE-2025-59506, CVE-2025-59507,
CVE-2025-59508, CVE-2025-59509, CVE-2025-59510, CVE-2025-59511,
CVE-2025-59512, CVE-2025-59513, CVE-2025-59514, CVE-2025-59515,
CVE-2025-60703, CVE-2025-60704, CVE-2025-60705, CVE-2025-60706,
CVE-2025-60707, CVE-2025-60708, CVE-2025-60709, CVE-2025-60714,
CVE-2025-60715, CVE-2025-60716, CVE-2025-60717, CVE-2025-60719,
CVE-2025-60720, CVE-2025-60723, CVE-2025-60724, CVE-2025-62208,
CVE-2025-62209, CVE-2025-62213, CVE-2025-62215, CVE-2025-62217,
CVE-2025-62218, CVE-2025-62219, CVE-2025-62452

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • December 22, 2025: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.