Friday, April 11, 2025
HomeCyber Security NewsHitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Hitachi Authentication Bypass Vulnerability Allows Attackers to Hack the System Remotely

Published on

SIEM as a Service

Follow Us on Google News

Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.

A severe vulnerability has been discovered in Hitachi’s Infrastructure Analytics Advisor and Ops Center Analyzer, posing a significant security risk to users of these products.

The vulnerability, identified as CVE-2024-10205, has a CVSS 3.1 score of 9.4, categorized as “High.”

- Advertisement - Google News

This flaw allows unauthorized users to bypass authentication, potentially leading to data exposure, system compromise, and service disruptions.

The vulnerability stems from an authorization bypass issue in the affected Hitachi software components.

Exploiting this flaw requires no prior authentication, making it particularly dangerous. It allows threat actors remote access to the system with the ability to compromise confidentiality, integrity, and availability.

2024 MITRE ATT&CK Evaluation Results Released for SMEs & MSPs -> Download Free Guide

Affected Products

The vulnerability affects specific versions of Hitachi products. For Hitachi Ops Center Analyzer (English version), the impacted component is Analyzer Detail View, with affected versions ranging from 10.0.0-00 or later but less than 11.0.3-00, running on the Linux (x64) platform.

Similarly, for Hitachi Infrastructure Analytics Advisor (English version), the affected component is Data Center Analytics, with impacted versions spanning from 2.1.0-00 up to 4.4.0-00, also on the Linux (x64) platform.

Fixed Products

Hitachi has released updated versions to mitigate the issue. Users are advised to upgrade to these fixed versions immediately:

  1. Hitachi Ops Center Analyzer: Version 11.0.3-00 (Linux x64)
  2. Hitachi Infrastructure Analytics Advisor: Contact your Hitachi support team for the latest fixed version.

Currently, no workarounds are available to address the vulnerability. Applying the fixed version is the only effective solution to safeguard affected systems.

Organizations utilizing these products must prioritize updating to the fixed versions or consult with Hitachi’s support services for appropriate solutions. Until patched, affected systems remain exposed to potentially devastating cyberattacks.

This discovery highlights the critical importance of maintaining up-to-date software and monitoring for security advisories.

Organizations should assess their environments promptly and take immediate corrective action to mitigate the associated risks.

Stay tuned for additional updates and reach out to Hitachi for further technical assistance. Cybersecurity remains a top priority, and proactive measures are essential in addressing vulnerabilities like CVE-2024-10205.

Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...

Microsoft Boosts Exchange and SharePoint Security with Updated Antimalware Scan

Microsoft has fortified its Exchange Server and SharePoint Server security by integrating advanced Antimalware...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

TROX Stealer Harvests Sensitive Data Including Stored Credit Cards and Browser Credentials

Cybersecurity experts at Sublime have uncovered a complex malware campaign revolving around TROX Stealer,...

Chinese eCrime Group Targets Users in 120+ Countries to Steal Banking Credentials

Smishing Triad, a Chinese eCrime group, has launched an extensive operation targeting users across...

Calix Devices Vulnerable to Pre-Auth RCE on Port 6998, Root Access Possible

A severe security flaw enabling unauthenticated remote code execution (RCE) with root privileges has...