First published: Fri Feb 14 2020(Updated: )
A vulnerability in Hitachi Command Suite prior to 8.6.2-00, Hitachi Automation Director prior to 8.6.2-00 and Hitachi Infrastructure Analytics Advisor prior to 4.2.0-00 allow authenticated remote users to load an arbitrary Cascading Style Sheets (CSS) token sequence. Hitachi Command Suite includes Hitachi Device Manager, Hitachi Tiered Storage Manager, Hitachi Replication Manager, Hitachi Tuning Manager, Hitachi Global Link Manager and Hitachi Compute Systems Manager.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hitachi Device Manager | <8.6.2-00 | |
Linux Linux kernel | ||
Microsoft Windows | ||
Oracle Solaris | ||
Hitachi Compute Systems Manager | <8.6.2-00 | |
Hitachi Automation Director | <8.6.2-00 | |
Hitachi Tiered Storage Manager | <8.6.2-00 | |
Hitachi Replication Manager | <8.6.2-00 | |
Hitachi Tuning Manager | <8.6.2-00 | |
Hitachi Global Link Manager | <8.6.2-00 | |
Hitachi Infrastructure Analytics Advisor | <4.2.0-00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-21033.
CVE-2018-21033 has a severity rating of 6.5 (medium).
CVE-2018-21033 affects Hitachi Command Suite, Hitachi Automation Director, and Hitachi Infrastructure Analytics Advisor versions prior to 8.6.2-00 and 4.2.0-00 respectively.
Authenticated remote users can exploit CVE-2018-21033 by loading an arbitrary Cascading Style Sheets (CSS) token sequence.
No, Linux and Windows are not affected by CVE-2018-21033.