Critical Authentication Bypass Vulnerability Identified in Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer.
A severe vulnerability has been discovered in Hitachi’s Infrastructure Analytics Advisor and Ops Center Analyzer, posing a significant security risk to users of these products.
The vulnerability, identified as CVE-2024-10205, has a CVSS 3.1 score of 9.4, categorized as “High.”
This flaw allows unauthorized users to bypass authentication, potentially leading to data exposure, system compromise, and service disruptions.
The vulnerability stems from an authorization bypass issue in the affected Hitachi software components.
Exploiting this flaw requires no prior authentication, making it particularly dangerous. It allows threat actors remote access to the system with the ability to compromise confidentiality, integrity, and availability.
2024 MITRE ATT&CK Evaluation Results Released for SMEs & MSPs -> Download Free Guide
The vulnerability affects specific versions of Hitachi products. For Hitachi Ops Center Analyzer (English version), the impacted component is Analyzer Detail View, with affected versions ranging from 10.0.0-00 or later but less than 11.0.3-00, running on the Linux (x64) platform.
Similarly, for Hitachi Infrastructure Analytics Advisor (English version), the affected component is Data Center Analytics, with impacted versions spanning from 2.1.0-00 up to 4.4.0-00, also on the Linux (x64) platform.
Hitachi has released updated versions to mitigate the issue. Users are advised to upgrade to these fixed versions immediately:
Currently, no workarounds are available to address the vulnerability. Applying the fixed version is the only effective solution to safeguard affected systems.
Organizations utilizing these products must prioritize updating to the fixed versions or consult with Hitachi’s support services for appropriate solutions. Until patched, affected systems remain exposed to potentially devastating cyberattacks.
This discovery highlights the critical importance of maintaining up-to-date software and monitoring for security advisories.
Organizations should assess their environments promptly and take immediate corrective action to mitigate the associated risks.
Stay tuned for additional updates and reach out to Hitachi for further technical assistance. Cybersecurity remains a top priority, and proactive measures are essential in addressing vulnerabilities like CVE-2024-10205.
Investigate Real-World Malicious Links, Malware & Phishing Attacks With ANY.RUN – Try for Free
Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow attackers…
The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux kernel…
Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a sophisticated…
A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted European…
A recent report by Cyble has shed light on the evolving tactics of hacktivist groups,…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released nine new advisories detailing severe…