Skip to main content

Hitachi
Contact UsContact Us

May 20, 2026
Hitachi, Ltd.

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

hitachi-sec-2026-310

Vulnerability description

CVE-2026-23667
Broadcast DVR Elevation of Privilege Vulnerability
CVE-2026-23668
Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2026-23669
Windows Print Spooler Remote Code Execution Vulnerability
CVE-2026-23671
Windows Bluetooth RFCOM Protocol Driver Elevation of Privilege Vulnerability
CVE-2026-23672
Windows Universal Disk Format File System Driver (UDFS) Elevation of Privilege Vulnerability
CVE-2026-23673
Windows Resilient File System (ReFS) Elevation of Privilege Vulnerability
CVE-2026-23674
MapUrlToZone Security Feature Bypass Vulnerability
CVE-2026-24282
Push message Routing Service Elevation of Privilege Vulnerability
CVE-2026-24285
Win32k Elevation of Privilege Vulnerability
CVE-2026-24287
Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24288
Windows Mobile Broadband Driver Remote Code Execution Vulnerability
CVE-2026-24289
Windows Kernel Elevation of Privilege Vulnerability
CVE-2026-24290
Windows Projected File System Elevation of Privilege Vulnerability
CVE-2026-24291
Windows Accessibility Infrastructure (ATBroker.exe) Elevation of Privilege Vulnerability
CVE-2026-24292
Windows Connected Devices Platform Service Elevation of Privilege Vulnerability
CVE-2026-24293
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-24294
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-24295
Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24296
Windows Device Association Service Elevation of Privilege Vulnerability
CVE-2026-24297
Windows Kerberos Security Feature Bypass Vulnerability
CVE-2026-25165
Performance Counters for Windows Elevation of Privilege Vulnerability
CVE-2026-25166
Windows System Image Manager Assessment and Deployment Kit (ADK) Remote Code Execution Vulnerability
CVE-2026-25168
Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25169
Windows Graphics Component Denial of Service Vulnerability
CVE-2026-25171
Windows Authentication Elevation of Privilege Vulnerability
CVE-2026-25173
Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability
CVE-2026-25174
Windows Extensible File Allocation Table Elevation of Privilege Vulnerability
CVE-2026-25175
Windows NTFS Elevation of Privilege Vulnerability
CVE-2026-25176
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25177
Active Directory Domain Services Elevation of Privilege Vulnerability
CVE-2026-25178
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25179
Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability
CVE-2026-25180
Windows Graphics Component Information Disclosure Vulnerability
CVE-2026-25181
GDI+ Information Disclosure Vulnerability
CVE-2026-25185
Windows Shell Link Processing Spoofing Vulnerability
CVE-2026-25186
Windows Accessibility Infrastructure (ATBroker.exe) Information Disclosure Vulnerability
CVE-2026-25187
Winlogon Elevation of Privilege Vulnerability
CVE-2026-25188
Windows Telephony Service Elevation of Privilege Vulnerability
CVE-2026-25189
Windows DWM Core Library Elevation of Privilege Vulnerability
CVE-2026-25190
GDI Remote Code Execution Vulnerability
CVE-2026-26128
Windows SMB Server Elevation of Privilege Vulnerability
CVE-2026-26132
Windows Kernel Elevation of Privilege Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Virtual Storage Platform 5200, 5600, 5200H, 5600H
Hitachi Virtual Storage Platform 5100, 5500, 5100H, 5500H
Vulnerability
ID

[Windows 10 for x64-based Systems (Version1809)]

CVE-2026-23667, CVE-2026-23668, CVE-2026-23669, CVE-2026-23671,
CVE-2026-23672, CVE-2026-23673, CVE-2026-23674, CVE-2026-24282,
CVE-2026-24285, CVE-2026-24287, CVE-2026-24289, CVE-2026-24290,
CVE-2026-24291, CVE-2026-24292, CVE-2026-24294, CVE-2026-24295,
CVE-2026-24296, CVE-2026-24297, CVE-2026-25165, CVE-2026-25166,
CVE-2026-25168, CVE-2026-25169, CVE-2026-25171, CVE-2026-25173,
CVE-2026-25174, CVE-2026-25175, CVE-2026-25176, CVE-2026-25177,
CVE-2026-25178, CVE-2026-25179, CVE-2026-25180, CVE-2026-25181,
CVE-2026-25185, CVE-2026-25186, CVE-2026-25187, CVE-2026-25188,
CVE-2026-25189, CVE-2026-25190, CVE-2026-26128

[Windows 10 for x64-based Systems (Version21H2)]

CVE-2026-23667, CVE-2026-23668, CVE-2026-23669, CVE-2026-23671,
CVE-2026-23672, CVE-2026-23673, CVE-2026-23674, CVE-2026-24282,
CVE-2026-24285, CVE-2026-24287, CVE-2026-24288, CVE-2026-24289,
CVE-2026-24290, CVE-2026-24291, CVE-2026-24292, CVE-2026-24293,
CVE-2026-24294, CVE-2026-24295, CVE-2026-24296, CVE-2026-24297,
CVE-2026-25165, CVE-2026-25166, CVE-2026-25168, CVE-2026-25169,
CVE-2026-25171, CVE-2026-25173, CVE-2026-25174, CVE-2026-25175,
CVE-2026-25176, CVE-2026-25177, CVE-2026-25178, CVE-2026-25179,
CVE-2026-25180, CVE-2026-25181, CVE-2026-25185, CVE-2026-25186,
CVE-2026-25187, CVE-2026-25188, CVE-2026-25189, CVE-2026-25190,
CVE-2026-26128, CVE-2026-26132

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform E590, E790, E990, E1090, E590H, E790H, E1090H
  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • May 20, 2026: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.