Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2020.4479 Hitachi Ops Center Common Services - Multiple vulnerabilities 18 December 2020 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Hitachi Command Suite Publisher: Hitachi Operating System: Windows Linux variants Solaris Impact/Access: Cross-site Scripting -- Remote with User Interaction Resolution: Patch/Upgrade Original Bulletin: https://www.hitachi.co.jp/Prod/comp/soft1/global/security/info/vuls/hitachi-sec-2020-139/index.html - --------------------------BEGIN INCLUDED TEXT-------------------- Multiple vulnerabilities have been found in Hitachi Ops Center Common Services. Cross-site Scripting Vulnerability in Hitachi Command Suite o Security Information ID o Vulnerability description o Affected products o Fixed products o Revision history Update: December 18, 2020 A Cross-site Scripting vulnerability was found in Hitachi Command Suite. Security Information ID hitachi-sec-2020-139 Vulnerability description A Cross-site Scripting vulnerability was found in Hitachi Command Suite. Affected products and versions are listed below. Please upgrade your version to the appropriate version. Affected products Product name: Hitachi Device Manager Software (Japanese version) Version(s): Windows, Linux, Solaris 6.0.0-00 or more and less than 8.0.0-00 Windows, Linux 8.0.0-00 or more and less than 8.7.7-00 Product name: Hitachi Device Manager Software (English version) Version(s): Windows, Linux, Solaris 6.0.0-00 or more and less than 8.0.0-00 Windows, Linux 8.0.0-00 or more and less than 8.2.1-00 Product name: Hitachi Tiered Storage Manager Software (Japanese version) Version(s): Windows, Linux, Solaris 6.0.0-00 or more and less than 8.0.0-00 Windows, Linux 8.0.0-00 or more and less than 8.7.7-00 Product name: Hitachi Tiered Storage Manager Software (English version) Version(s): Windows, Linux, Solaris 6.0.0-00 or more and less than 8.0.0-00 Windows, Linux 8.0.0-00 or more and less than 8.2.1-00 Product name: Hitachi Tuning Manager Software (English version) Version(s): Windows, Linux, Solaris 6.0.0-00 or more and less than 8.0.0-00 Windows, Linux 8.0.0-00 or more and less than 8.7.7-00 Product name: Hitachi Replication Manager Software Version(s): Windows, Linux, Solaris less than 8.7.7-00 Product name: Hitachi Global Link Manager Software Version(s): Windows 6.0.0-00 or more and less than 8.7.0-00 Product name: Hitachi Compute Systems Manager Software (Japanese version) Version(s): Windows 7.4.1-02 or more and less than 8.7.7-00 Product name: Hitachi Compute Systems Manager Software (English version) Version(s): Windows 7.2.0-00 or more and less than 8.1.1-00 Fixed products Product name: Hitachi Device Manager Software Version(s): Windows, Linux(*1) 8.7.7-00 December 14, 2020 Product name: Hitachi Tiered Storage Manager Software Version(s): Windows, Linux(*1) 8.7.7-00 December 14, 2020 Product name: Hitachi Tuning Manager Software (English version) Version(s): Windows, Linux(*1) 8.7.7-00 December 14, 2020 Product name: Hitachi Replication Manager Software Version(s): Windows, Linux(*1) 8.7.7-00 December 14, 2020 Product name: Hitachi Global Link Manager Software Version(s): Windows 8.7.6-01(*2) December 14, 2020 Product name: Hitachi Compute Systems Manager Software Version(s): Windows 8.7.7-00 December 14, 2020 For details on the fixed products, contact your Hitachi support service representative. *1 Solaris is no longer supported. Use the fixed version for Windows or Linux. *2 Included with Hitachi Dynamic Link Manager Advanced 8.7.7. Revision history December 18, 2020 This page is released. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBX9wNOONLKJtyKPYoAQiMIBAAq8pgc/g2FazB+nw6F+ZjJeGZA5gC8xKa 4+2dm5FQ3FLz7Rb4y2ZzcadaBo81QVaeFNSG57qEUaCEmTJhCpDD0Fhdd9ndo+4Z 9vqbrpRkOocbkIyRuksN67E6bE2QtHkeWTRTV0UHNpoJkABoB1pS5sqllOxmZ0GQ sD+4h5iIc48oVfQ/N7JQWVyJ64GPM578dncN0WGn6Q8hNn52JHSgiIguIUEPbTlB 4OpLfREGIWkYSM8iMCZbWf1WfiVSC7yg9Pz99gBzm6L1od4HdT4akoE6FnKrGpcV howF/m5C06yB/yLzehR84+zE1Br+OJe+YSGxyKB4oERJZuws1Bg12raar7ldtUJt 8qy70Svz5iE59wa7f4RY1MkELCkYUkmLgKf9zrqnuQUc2X+BUmtAbxOCFu3A2w4Q AZ5h/x2suwFnc3RnQyESRabhE3q3J3duD4fVUVz360FyZiQluO6z35vHNIVZboWx 6eHU46XBRTzAQl20g9VjDrEqijDHrQdMWJEhL4AcXbYulptv/t2dtfpHdbf5RKh0 ev0fHCRdFHeTZfd4QgVBl7w8KmQzQQGMwrje/45ftE+4d4JrQaFOOW2bQ1fy3RL/ lu/eE5YEotJooSSF7XfO0kCKzueD5bk8zrZgOMAGFKPIbfW0nFM8MhDFl08ghrnj Vrtxxxs3+Yk= =Ag1c -----END PGP SIGNATURE-----