Hitachi

June 5, 2020
Hitachi, Ltd. IT Platform Products Management Division

Hitachi Disk Array Systems have the following vulnerability.

Security Information ID

Hitachi-sec-2020-310

Vulnerability description

CVE-2020-0909 | Windows Hyper-V Denial of Service Vulnerability
CVE-2020-0963 | Windows GDI Information Disclosure Vulnerability
CVE-2020-1010 | Microsoft Windows Elevation of Privilege Vulnerability
CVE-2020-1021 | Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-1028 | Media Foundation Memory Corruption Vulnerability
CVE-2020-1035 | VBScript Remote Code Execution Vulnerability
CVE-2020-1037 | Chakra Scripting Engine Memory Corruption Vulnerability
CVE-2020-1048 | Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2020-1051 | Jet Database Engine Remote Code Execution Vulnerability
CVE-2020-1054 | Win32k Elevation of Privilege Vulnerability
CVE-2020-1055 | Microsoft Active Directory Federation Services Cross-Site Scripting Vulnerability
CVE-2020-1056 | Microsoft Edge Elevation of Privilege Vulnerability
CVE-2020-1058 | VBScript Remote Code Execution Vulnerability
CVE-2020-1059 | Microsoft Edge Spoofing Vulnerability
CVE-2020-1060 | VBScript Remote Code Execution Vulnerability
CVE-2020-1061 | Microsoft Script Runtime Remote Code Execution Vulnerability
CVE-2020-1062 | Internet Explorer Memory Corruption Vulnerability
CVE-2020-1064 | MSHTML Engine Remote Code Execution Vulnerability
CVE-2020-1065 | Scripting Engine Memory Corruption Vulnerability
CVE-2020-1066 | .NET Framework Elevation of Privilege Vulnerability
CVE-2020-1067 | Windows Remote Code Execution Vulnerability
CVE-2020-1068 | Microsoft Windows Elevation of Privilege Vulnerability
CVE-2020-1070 | Windows Print Spooler Elevation of Privilege Vulnerability
CVE-2020-1071 | Windows Remote Access Common Dialog Elevation of Privilege Vulnerability
CVE-2020-1072 | Windows Kernel Information Disclosure Vulnerability
CVE-2020-1075 | Windows Subsystem for Linux Information Disclosure Vulnerability
CVE-2020-1076 | Windows Denial of Service Vulnerability
CVE-2020-1077 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1078 | Windows Installer Elevation of Privilege Vulnerability
CVE-2020-1079 | Microsoft Windows Elevation of Privilege Vulnerability
CVE-2020-1081 | Windows Printer Service Elevation of Privilege Vulnerability
CVE-2020-1082 | Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-1084 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVE-2020-1086 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1087 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-1088 | Windows Error Reporting Elevation of Privilege Vulnerability
CVE-2020-1090 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1092 | Internet Explorer Memory Corruption Vulnerability
CVE-2020-1093 | VBScript Remote Code Execution Vulnerability
CVE-2020-1096 | Microsoft Edge PDF Remote Code Execution Vulnerability
CVE-2020-1108 | .NET Core & .NET Framework Denial of Service Vulnerability
CVE-2020-1109 | Windows Update Stack Elevation of Privilege Vulnerability
CVE-2020-1110 | Windows Update Stack Elevation of Privilege Vulnerability
CVE-2020-1111 | Windows Clipboard Service Elevation of Privilege Vulnerability
CVE-2020-1112 | Windows Background Intelligent Transfer Service Elevation of Privilege Vulnerability
CVE-2020-1113 | Windows Task Scheduler Security Feature Bypass Vulnerability
CVE-2020-1114 | Windows Kernel Elevation of Privilege Vulnerability
CVE-2020-1116 | Windows CSRSS Information Disclosure Vulnerability
CVE-2020-1117 | Microsoft Color Management Remote Code Execution Vulnerability
CVE-2020-1118 | Microsoft Windows Transport Layer Security Denial of Service Vulnerability
CVE-2020-1121 | Windows Clipboard Service Elevation of Privilege Vulnerability
CVE-2020-1123 | Connected User Experiences and Telemetry Service Denial of Service Vulnerability
CVE-2020-1124 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1125 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1126 | Media Foundation Memory Corruption Vulnerability
CVE-2020-1131 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1132 | Windows Error Reporting Manager Elevation of Privilege Vulnerability
CVE-2020-1134 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1135 | Windows Graphics Component Elevation of Privilege Vulnerability
CVE-2020-1136 | Media Foundation Memory Corruption Vulnerability
CVE-2020-1137 | Windows Push Notification Service Elevation of Privilege Vulnerability
CVE-2020-1138 | Windows Storage Service Elevation of Privilege Vulnerability
CVE-2020-1139 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1140 | DirectX Elevation of Privilege Vulnerability
CVE-2020-1141 | Windows GDI Information Disclosure Vulnerability
CVE-2020-1142 | Windows GDI Elevation of Privilege Vulnerability
CVE-2020-1143 | Win32k Elevation of Privilege Vulnerability
CVE-2020-1144 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1149 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1150 | Media Foundation Memory Corruption Vulnerability
CVE-2020-1151 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1153 | Microsoft Graphics Components Remote Code Execution Vulnerability
CVE-2020-1154 | Windows Common Log File System Driver Elevation of Privilege Vulnerability
CVE-2020-1155 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1156 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1157 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1158 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1164 | Windows Runtime Elevation of Privilege Vulnerability
CVE-2020-1174 | Jet Database Engine Remote Code Execution Vulnerability
CVE-2020-1175 | Jet Database Engine Remote Code Execution Vulnerability
CVE-2020-1176 | Jet Database Engine Remote Code Execution Vulnerability
CVE-2020-1179 | Windows GDI Information Disclosure Vulnerability
CVE-2020-1184 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1185 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1186 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1187 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1188 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1189 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1190 | Windows State Repository Service Elevation of Privilege Vulnerability
CVE-2020-1191 | Windows State Repository Service Elevation of Privilege Vulnerability

Affected products

The following table shows the affected products.

Product
Name
Hitachi Unified Storage VM (HUS VM)
Vulnerability
ID
CVE-2020-0909, CVE-2020-0963, CVE-2020-1010, CVE-2020-1021, CVE-2020-1035,
CVE-2020-1037, CVE-2020-1048, CVE-2020-1051, CVE-2020-1054, CVE-2020-1058,
CVE-2020-1060, CVE-2020-1061, CVE-2020-1062, CVE-2020-1064, CVE-2020-1067,
CVE-2020-1068, CVE-2020-1070, CVE-2020-1071, CVE-2020-1072, CVE-2020-1076,
CVE-2020-1078, CVE-2020-1079, CVE-2020-1081, CVE-2020-1082, CVE-2020-1084,
CVE-2020-1086, CVE-2020-1088, CVE-2020-1092, CVE-2020-1093, CVE-2020-1112,
CVE-2020-1113, CVE-2020-1114, CVE-2020-1116, CVE-2020-1123, CVE-2020-1124,
CVE-2020-1125, CVE-2020-1131, CVE-2020-1132, CVE-2020-1134, CVE-2020-1136,
CVE-2020-1139, CVE-2020-1141, CVE-2020-1143, CVE-2020-1144, CVE-2020-1149,
CVE-2020-1153, CVE-2020-1154, CVE-2020-1156, CVE-2020-1157, CVE-2020-1164,
CVE-2020-1174, CVE-2020-1175, CVE-2020-1176, CVE-2020-1179
Product
Name
Hitachi Virtual Storage Platform 5100, 5500
Hitachi Virtual Storage Platform 5100H, 5500H
Vulnerability
ID
CVE-2020-0909, CVE-2020-0963, CVE-2020-1010, CVE-2020-1021, CVE-2020-1028,
CVE-2020-1035, CVE-2020-1037, CVE-2020-1048, CVE-2020-1051, CVE-2020-1054,
CVE-2020-1055, CVE-2020-1056, CVE-2020-1058, CVE-2020-1059, CVE-2020-1060,
CVE-2020-1061, CVE-2020-1062, CVE-2020-1064, CVE-2020-1065, CVE-2020-1067,
CVE-2020-1068, CVE-2020-1070, CVE-2020-1071, CVE-2020-1072, CVE-2020-1075,
CVE-2020-1076, CVE-2020-1077, CVE-2020-1078, CVE-2020-1079, CVE-2020-1081,
CVE-2020-1082, CVE-2020-1084, CVE-2020-1086, CVE-2020-1087, CVE-2020-1088,
CVE-2020-1090, CVE-2020-1092, CVE-2020-1093, CVE-2020-1096, CVE-2020-1109,
CVE-2020-1110, CVE-2020-1111, CVE-2020-1112, CVE-2020-1113, CVE-2020-1114,
CVE-2020-1116, CVE-2020-1117, CVE-2020-1118, CVE-2020-1121, CVE-2020-1123,
CVE-2020-1124, CVE-2020-1125, CVE-2020-1126, CVE-2020-1131, CVE-2020-1132,
CVE-2020-1134, CVE-2020-1135, CVE-2020-1136, CVE-2020-1137, CVE-2020-1138,
CVE-2020-1139, CVE-2020-1140, CVE-2020-1141, CVE-2020-1142, CVE-2020-1143,
CVE-2020-1144, CVE-2020-1149, CVE-2020-1151, CVE-2020-1153, CVE-2020-1154,
CVE-2020-1155, CVE-2020-1156, CVE-2020-1157, CVE-2020-1158, CVE-2020-1164,
CVE-2020-1174, CVE-2020-1175, CVE-2020-1176, CVE-2020-1179, CVE-2020-1184,
CVE-2020-1185, CVE-2020-1186, CVE-2020-1187, CVE-2020-1188, CVE-2020-1189,
CVE-2020-1190, CVE-2020-1191
Product
Name
Hitachi Virtual Storage Platform G1000, G1500
Hitachi Virtual Storage Platform F1500
Hitachi Virtual Storage Platform VX7
Vulnerability
ID
CVE-2020-0909, CVE-2020-0963, CVE-2020-1010, CVE-2020-1021, CVE-2020-1035,
CVE-2020-1037, CVE-2020-1048, CVE-2020-1051, CVE-2020-1054, CVE-2020-1058,
CVE-2020-1060, CVE-2020-1061, CVE-2020-1062, CVE-2020-1064, CVE-2020-1067,
CVE-2020-1068, CVE-2020-1070, CVE-2020-1071, CVE-2020-1072, CVE-2020-1076,
CVE-2020-1078, CVE-2020-1079, CVE-2020-1081, CVE-2020-1082, CVE-2020-1084,
CVE-2020-1086, CVE-2020-1088, CVE-2020-1092, CVE-2020-1093, CVE-2020-1112,
CVE-2020-1113, CVE-2020-1114, CVE-2020-1116, CVE-2020-1123, CVE-2020-1124,
CVE-2020-1125, CVE-2020-1131, CVE-2020-1132, CVE-2020-1134, CVE-2020-1136,
CVE-2020-1139, CVE-2020-1141, CVE-2020-1143, CVE-2020-1144, CVE-2020-1149,
CVE-2020-1153, CVE-2020-1154, CVE-2020-1156, CVE-2020-1157, CVE-2020-1164,
CVE-2020-1174, CVE-2020-1175, CVE-2020-1176, CVE-2020-1179

The following products are not affected by the vulnerabilities:

  • Hitachi Virtual Storage Platform G130, G150, G350, G370, G700, G900
  • Hitachi Virtual Storage Platform F350, F370, F700, F900
  • Hitachi Virtual Storage Platform G100, G200, G400, G600, G800
  • Hitachi Virtual Storage Platform F400, F600, F800
  • Hitachi Virtual Storage Platform N400, N600, N800
  • Hitachi Universal Storage Platform V
  • Hitachi Universal Storage Platform VM
  • Hitachi Unified Storage 100, Hitachi Adaptable Modular Storage
  • Hitachi Workgroup Modular Storage, Hitachi Simple Modular Storage
  • Hitachi Virtual Storage Platform, Hitachi Virtual Storage Platform VP9500

Action to be taken

Software update.
Please contact your authorized service representative for details on any corrective actions such as software updates and the schedule for their release.

References

Please refer to the Security Update Guide (Microsoft) about the vulnerabilities.

Revision history

  • June 5, 2020: This security information page is published.
  • Hitachi, Ltd. (hereinafter referred to as "Hitachi") tries to provide accurate information about security countermeasures. However, since information about security problems constantly changes, the contents of these Web pages are subject to change without prior notice. When referencing information, please confirm that you are referencing the latest information.
  • The Web pages include information about products that are developed by non-Hitachi software developers. Vulnerability information about those products is based on the information provided or disclosed by those developers. Although Hitachi is careful about the accuracy and completeness of this information, the contents of the Web pages may change depending on the changes made by the developers.
  • The Web pages are intended to provide vulnerability information only, and Hitachi shall not have any legal responsibility for the information contained in them. Hitachi shall not be liable for any consequences arising out of or in connection with the security countermeasures or other actions that you will take or have taken (or not taken) by yourself.
  • The links to other web sites are valid at the time of the release of the page. Although Hitachi makes an effort to maintain the links, Hitachi cannot guarantee their permanent availability.