Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
References
Link | Resource |
---|---|
https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:01
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.0 |
References | () https://www.hitachi.com/hirt/security/index.html - Vendor Advisory |
Information
Published : 2021-10-12 19:15
Updated : 2024-11-21 06:01
NVD link : CVE-2021-29645
Mitre link : CVE-2021-29645
CVE.ORG link : CVE-2021-29645
JSON object : View
Products Affected
hitachi
- job_management_partner_1\/it_desktop_management_2-manager
- it_operations_director
- job_management_partner_1\/it_desktop_management-manager
- jp1\/netm\/dm_client-remote_control_feature
- job_management_partner_1\/remote_control_agent
- jp1\/it_desktop_management_2-operations_director
- jp1\/it_desktop_management-manager
- job_management_partner_1\/software_distribution_manager
- jp1\/netm\/dm_manager
- jp1\/netm\/dm_client
- job_management_partner_1\/software_distribution_client
- jp1\/remote_control_feature
- jp1\/it_desktop_management_2-manager
- jp1\/netm\/remote_control_feature
microsoft
- windows
CWE