Skip to main content

Hitachi
Contact UsContact Us

Update: February 26, 2010

There is a problem with file permissions on servers running the Windows version of JP1/Cm2/Network Node Manager (hereafter abbreviated to NNM) Remote Console.

Vulnerability ID

HS10-002

Vulnerability description

There is a problem with file permissions on servers running the Windows version of NNM Remote Console.

Malicious local users might replace files provided by NNM Remote Console with other files. The affected products and versions are listed below. Please perform the Countermeasures below.

Affected products

The information is organized under the following headings:

(Example)
Product name: Gives the name of the affected product.

Version:

Platform
Gives the affected version.

Product name: JP1/Cm2/Network Node Manager Enterprise

Version(s):

Windows
06-51 to 06-71

Product name: JP1/Cm2/Network Node Manager 250

Version(s):

Windows
06-51 to 06-71

Product name: JP1/Cm2/Network Node Manager

Version(s):

Windows
07-00 to 07-10

Product name: JP1/Cm2/Network Node Manager Starter Edition Enterprise

Version(s):

Windows
08-00 to 08-10

Product name: JP1/Cm2/Network Node Manager Starter Edition 250

Version(s):

Windows
08-00 to 08-10

Countermeasures

Please perform the following countermeasure:

  • Restrict access to the NNM Remote Console server to trusted users only.

Revision history

February 26, 2010
This page is released.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.