Skip to main content

Hitachi
Contact UsContact Us

February 20, 2026
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2026-302

Vulnerability description

CVE-2023-31096
MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2024-55414
Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability
CVE-2026-20804
Windows Hello Tampering Vulnerability
CVE-2026-20805
Desktop Window Manager Information Disclosure Vulnerability
CVE-2026-20809
Windows Kernel Memory Elevation of Privilege Vulnerability
CVE-2026-20810
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20812
LDAP Tampering Vulnerability
CVE-2026-20814
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20816
Windows Installer Elevation of Privilege Vulnerability
CVE-2026-20817
Windows Error Reporting Service Elevation of Privilege Vulnerability
CVE-2026-20820
Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2026-20821
Remote Procedure Call Information Disclosure Vulnerability
CVE-2026-20822
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-20823
Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20824
Windows Remote Assistance Security Feature Bypass Vulnerability
CVE-2026-20825
Windows Hyper-V Information Disclosure Vulnerability
CVE-2026-20826
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20827
Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability
CVE-2026-20828
Windows rndismp6.sys Information Disclosure Vulnerability
CVE-2026-20829
TPM Trustlet Information Disclosure Vulnerability
CVE-2026-20831
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20832
Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability
CVE-2026-20834
Windows Spoofing Vulnerability
CVE-2026-20836
DirectX Graphics Kernel Elevation of Privilege Vulnerability
CVE-2026-20837
Windows Media Remote Code Execution Vulnerability
CVE-2026-20839
Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability
CVE-2026-20840
Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20842
Microsoft DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-20843
Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability
CVE-2026-20844
Windows Clipboard Server Elevation of Privilege Vulnerability
CVE-2026-20847
Microsoft Windows File Explorer Spoofing Vulnerability
CVE-2026-20848
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20849
Windows Kerberos Elevation of Privilege Vulnerability
CVE-2026-20852
Windows Hello Tampering Vulnerability
CVE-2026-20853
Windows WalletService Elevation of Privilege Vulnerability
CVE-2026-20856
Windows Server Update Service (WSUS) Remote Code Execution Vulnerability
CVE-2026-20857
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20858
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20860
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-20861
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20862
Windows Management Services Information Disclosure Vulnerability
CVE-2026-20864
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-20865
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20866
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20867
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20868
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-20869
Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability
CVE-2026-20871
Desktop Windows Manager Elevation of Privilege Vulnerability
CVE-2026-20872
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20873
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20874
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20875
Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability
CVE-2026-20877
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20918
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20919
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20921
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20922
Windows NTFS Remote Code Execution Vulnerability
CVE-2026-20923
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20924
Windows Management Services Elevation of Privilege Vulnerability
CVE-2026-20925
NTLM Hash Disclosure Spoofing Vulnerability
CVE-2026-20926
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20927
Windows SMB Server Denial of Service Vulnerability
CVE-2026-20929
Windows HTTP.sys Elevation of Privilege Vulnerability
CVE-2026-20931
Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-20932
Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20934
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-20936
Windows NDIS Information Disclosure Vulnerability
CVE-2026-20937
Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20939
Windows File Explorer Information Disclosure Vulnerability
CVE-2026-20940
Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability
CVE-2026-20962
Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability
CVE-2026-21265
Secure Boot Certificate Expiration Security Feature Bypass Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2023-31096, CVE-2024-55414, CVE-2026-20804, CVE-2026-20805,
CVE-2026-20809, CVE-2026-20810, CVE-2026-20812, CVE-2026-20814,
CVE-2026-20816, CVE-2026-20820, CVE-2026-20821, CVE-2026-20822,
CVE-2026-20823, CVE-2026-20824, CVE-2026-20825, CVE-2026-20826,
CVE-2026-20827, CVE-2026-20828, CVE-2026-20829, CVE-2026-20831,
CVE-2026-20832, CVE-2026-20834, CVE-2026-20836, CVE-2026-20837,
CVE-2026-20839, CVE-2026-20840, CVE-2026-20843, CVE-2026-20844,
CVE-2026-20847, CVE-2026-20848, CVE-2026-20849, CVE-2026-20852,
CVE-2026-20853, CVE-2026-20856, CVE-2026-20857, CVE-2026-20858,
CVE-2026-20860, CVE-2026-20861, CVE-2026-20862, CVE-2026-20864,
CVE-2026-20865, CVE-2026-20866, CVE-2026-20867, CVE-2026-20868,
CVE-2026-20869, CVE-2026-20872, CVE-2026-20873, CVE-2026-20874,
CVE-2026-20875, CVE-2026-20877, CVE-2026-20918, CVE-2026-20919,
CVE-2026-20921, CVE-2026-20922, CVE-2026-20923, CVE-2026-20924,
CVE-2026-20925, CVE-2026-20926, CVE-2026-20927, CVE-2026-20929,
CVE-2026-20931, CVE-2026-20932, CVE-2026-20934, CVE-2026-20936,
CVE-2026-20937, CVE-2026-20939, CVE-2026-20940, CVE-2026-20962,
CVE-2026-21265

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2023-31096, CVE-2024-55414, CVE-2026-20804, CVE-2026-20805,
CVE-2026-20809, CVE-2026-20810, CVE-2026-20812, CVE-2026-20814,
CVE-2026-20816, CVE-2026-20817, CVE-2026-20820, CVE-2026-20821,
CVE-2026-20822, CVE-2026-20823, CVE-2026-20824, CVE-2026-20825,
CVE-2026-20826, CVE-2026-20827, CVE-2026-20828, CVE-2026-20829,
CVE-2026-20831, CVE-2026-20832, CVE-2026-20834, CVE-2026-20836,
CVE-2026-20837, CVE-2026-20839, CVE-2026-20840, CVE-2026-20842,
CVE-2026-20843, CVE-2026-20844, CVE-2026-20847, CVE-2026-20848,
CVE-2026-20849, CVE-2026-20852, CVE-2026-20853, CVE-2026-20856,
CVE-2026-20857, CVE-2026-20858, CVE-2026-20860, CVE-2026-20861,
CVE-2026-20862, CVE-2026-20864, CVE-2026-20865, CVE-2026-20866,
CVE-2026-20867, CVE-2026-20868, CVE-2026-20869, CVE-2026-20871,
CVE-2026-20872, CVE-2026-20873, CVE-2026-20874, CVE-2026-20875,
CVE-2026-20877, CVE-2026-20918, CVE-2026-20919, CVE-2026-20921,
CVE-2026-20922, CVE-2026-20923, CVE-2026-20924, CVE-2026-20925,
CVE-2026-20926, CVE-2026-20927, CVE-2026-20929, CVE-2026-20931,
CVE-2026-20932, CVE-2026-20934, CVE-2026-20936, CVE-2026-20937,
CVE-2026-20939, CVE-2026-20940, CVE-2026-20962, CVE-2026-21265

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • February 20, 2026: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.