JVNDB-2026-004359

Vulnerability from jvndb - Published: 2026-02-20 18:35 - Updated:2026-02-20 18:35
Summary
Security information for Hitachi Disk Array Systems
Details
CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability CVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability CVE-2026-20804 | Windows Hello Tampering Vulnerability CVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability CVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability CVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20812 | LDAP Tampering Vulnerability CVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability CVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability CVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability CVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability CVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability CVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability CVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability CVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability CVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability CVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability CVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability CVE-2026-20834 | Windows Spoofing Vulnerability CVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability CVE-2026-20837 | Windows Media Remote Code Execution Vulnerability CVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability CVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability CVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability CVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability CVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability CVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability CVE-2026-20852 | Windows Hello Tampering Vulnerability CVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability CVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability CVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability CVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability CVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability CVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability CVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability CVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability CVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability CVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability CVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability CVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability CVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability CVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability CVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability CVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability CVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability CVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability CVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability CVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability CVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability
References
CVE https://www.cve.org/CVERecord?id=CVE-2023-31096
CVE https://www.cve.org/CVERecord?id=CVE-2024-55414
CVE https://www.cve.org/CVERecord?id=CVE-2026-20804
CVE https://www.cve.org/CVERecord?id=CVE-2026-20805
CVE https://www.cve.org/CVERecord?id=CVE-2026-20809
CVE https://www.cve.org/CVERecord?id=CVE-2026-20810
CVE https://www.cve.org/CVERecord?id=CVE-2026-20812
CVE https://www.cve.org/CVERecord?id=CVE-2026-20814
CVE https://www.cve.org/CVERecord?id=CVE-2026-20816
CVE https://www.cve.org/CVERecord?id=CVE-2026-20817
CVE https://www.cve.org/CVERecord?id=CVE-2026-20820
CVE https://www.cve.org/CVERecord?id=CVE-2026-20821
CVE https://www.cve.org/CVERecord?id=CVE-2026-20822
CVE https://www.cve.org/CVERecord?id=CVE-2026-20823
CVE https://www.cve.org/CVERecord?id=CVE-2026-20824
CVE https://www.cve.org/CVERecord?id=CVE-2026-20825
CVE https://www.cve.org/CVERecord?id=CVE-2026-20826
CVE https://www.cve.org/CVERecord?id=CVE-2026-20827
CVE https://www.cve.org/CVERecord?id=CVE-2026-20828
CVE https://www.cve.org/CVERecord?id=CVE-2026-20829
CVE https://www.cve.org/CVERecord?id=CVE-2026-20831
CVE https://www.cve.org/CVERecord?id=CVE-2026-20832
CVE https://www.cve.org/CVERecord?id=CVE-2026-20834
CVE https://www.cve.org/CVERecord?id=CVE-2026-20836
CVE https://www.cve.org/CVERecord?id=CVE-2026-20837
CVE https://www.cve.org/CVERecord?id=CVE-2026-20839
CVE https://www.cve.org/CVERecord?id=CVE-2026-20840
CVE https://www.cve.org/CVERecord?id=CVE-2026-20842
CVE https://www.cve.org/CVERecord?id=CVE-2026-20843
CVE https://www.cve.org/CVERecord?id=CVE-2026-20844
CVE https://www.cve.org/CVERecord?id=CVE-2026-20847
CVE https://www.cve.org/CVERecord?id=CVE-2026-20848
CVE https://www.cve.org/CVERecord?id=CVE-2026-20849
CVE https://www.cve.org/CVERecord?id=CVE-2026-20852
CVE https://www.cve.org/CVERecord?id=CVE-2026-20853
CVE https://www.cve.org/CVERecord?id=CVE-2026-20856
CVE https://www.cve.org/CVERecord?id=CVE-2026-20857
CVE https://www.cve.org/CVERecord?id=CVE-2026-20858
CVE https://www.cve.org/CVERecord?id=CVE-2026-20860
CVE https://www.cve.org/CVERecord?id=CVE-2026-20861
CVE https://www.cve.org/CVERecord?id=CVE-2026-20862
CVE https://www.cve.org/CVERecord?id=CVE-2026-20864
CVE https://www.cve.org/CVERecord?id=CVE-2026-20865
CVE https://www.cve.org/CVERecord?id=CVE-2026-20866
CVE https://www.cve.org/CVERecord?id=CVE-2026-20867
CVE https://www.cve.org/CVERecord?id=CVE-2026-20868
CVE https://www.cve.org/CVERecord?id=CVE-2026-20869
CVE https://www.cve.org/CVERecord?id=CVE-2026-20871
CVE https://www.cve.org/CVERecord?id=CVE-2026-20872
CVE https://www.cve.org/CVERecord?id=CVE-2026-20873
CVE https://www.cve.org/CVERecord?id=CVE-2026-20874
CVE https://www.cve.org/CVERecord?id=CVE-2026-20875
CVE https://www.cve.org/CVERecord?id=CVE-2026-20877
CVE https://www.cve.org/CVERecord?id=CVE-2026-20918
CVE https://www.cve.org/CVERecord?id=CVE-2026-20919
CVE https://www.cve.org/CVERecord?id=CVE-2026-20921
CVE https://www.cve.org/CVERecord?id=CVE-2026-20922
CVE https://www.cve.org/CVERecord?id=CVE-2026-20923
CVE https://www.cve.org/CVERecord?id=CVE-2026-20924
CVE https://www.cve.org/CVERecord?id=CVE-2026-20925
CVE https://www.cve.org/CVERecord?id=CVE-2026-20926
CVE https://www.cve.org/CVERecord?id=CVE-2026-20927
CVE https://www.cve.org/CVERecord?id=CVE-2026-20929
CVE https://www.cve.org/CVERecord?id=CVE-2026-20931
CVE https://www.cve.org/CVERecord?id=CVE-2026-20932
CVE https://www.cve.org/CVERecord?id=CVE-2026-20934
CVE https://www.cve.org/CVERecord?id=CVE-2026-20936
CVE https://www.cve.org/CVERecord?id=CVE-2026-20937
CVE https://www.cve.org/CVERecord?id=CVE-2026-20939
CVE https://www.cve.org/CVERecord?id=CVE-2026-20940
CVE https://www.cve.org/CVERecord?id=CVE-2026-20962
CVE https://www.cve.org/CVERecord?id=CVE-2026-21265
Related document https://msrc.microsoft.com/update-guide/en-us
Impacted products
Show details on JVN DB website

{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "dc:date": "2026-02-20T18:35+09:00",
  "dcterms:issued": "2026-02-20T18:35+09:00",
  "dcterms:modified": "2026-02-20T18:35+09:00",
  "description": "CVE-2023-31096 | MITRE: CVE-2023-31096 Windows Agere Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2024-55414 | Windows Motorola Soft Modem Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20804 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20805 | Desktop Window Manager Information Disclosure Vulnerability\r\nCVE-2026-20809 | Windows Kernel Memory Elevation of Privilege Vulnerability\r\nCVE-2026-20810 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20812 | LDAP Tampering Vulnerability\r\nCVE-2026-20814 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20816 | Windows Installer Elevation of Privilege Vulnerability\r\nCVE-2026-20817 | Windows Error Reporting Service Elevation of Privilege Vulnerability\r\nCVE-2026-20820 | Windows Common Log File System Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20821 | Remote Procedure Call Information Disclosure Vulnerability\r\nCVE-2026-20822 | Windows Graphics Component Elevation of Privilege Vulnerability\r\nCVE-2026-20823 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20824 | Windows Remote Assistance Security Feature Bypass Vulnerability\r\nCVE-2026-20825 | Windows Hyper-V Information Disclosure Vulnerability\r\nCVE-2026-20826 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20827 | Tablet Windows User Interface (TWINUI) Subsystem Information Disclosure Vulnerability\r\nCVE-2026-20828 | Windows rndismp6.sys Information Disclosure Vulnerability\r\nCVE-2026-20829 | TPM Trustlet Information Disclosure Vulnerability\r\nCVE-2026-20831 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20832 | Windows Remote Procedure Call Interface Definition Language (IDL) Elevation of Privilege Vulnerability\r\nCVE-2026-20834 | Windows Spoofing Vulnerability\r\nCVE-2026-20836 | DirectX Graphics Kernel Elevation of Privilege Vulnerability\r\nCVE-2026-20837 | Windows Media Remote Code Execution Vulnerability\r\nCVE-2026-20839 | Windows Client-Side Caching (CSC) Service Information Disclosure Vulnerability\r\nCVE-2026-20840 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20842 | Microsoft DWM Core Library Elevation of Privilege Vulnerability\r\nCVE-2026-20843 | Windows Routing and Remote Access Service (RRAS) Elevation of Privilege Vulnerability\r\nCVE-2026-20844 | Windows Clipboard Server Elevation of Privilege Vulnerability\r\nCVE-2026-20847 | Microsoft Windows File Explorer Spoofing Vulnerability\r\nCVE-2026-20848 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20849 | Windows Kerberos Elevation of Privilege Vulnerability\r\nCVE-2026-20852 | Windows Hello Tampering Vulnerability\r\nCVE-2026-20853 | Windows WalletService Elevation of Privilege Vulnerability\r\nCVE-2026-20856 | Windows Server Update Service (WSUS) Remote Code Execution Vulnerability\r\nCVE-2026-20857 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20858 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20860 | Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability\r\nCVE-2026-20861 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20862 | Windows Management Services Information Disclosure Vulnerability\r\nCVE-2026-20864 | Windows Connected Devices Platform Service Elevation of Privilege Vulnerability\r\nCVE-2026-20865 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20866 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20867 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20868 | Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability\r\nCVE-2026-20869 | Windows Local Session Manager (LSM) Elevation of Privilege Vulnerability\r\nCVE-2026-20871 | Desktop Windows Manager Elevation of Privilege Vulnerability\r\nCVE-2026-20872 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20873 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20874 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20875 | Windows Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability\r\nCVE-2026-20877 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20918 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20919 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20921 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20922 | Windows NTFS Remote Code Execution Vulnerability\r\nCVE-2026-20923 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20924 | Windows Management Services Elevation of Privilege Vulnerability\r\nCVE-2026-20925 | NTLM Hash Disclosure Spoofing Vulnerability\r\nCVE-2026-20926 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20927 | Windows SMB Server Denial of Service Vulnerability\r\nCVE-2026-20929 | Windows HTTP.sys Elevation of Privilege Vulnerability\r\nCVE-2026-20931 | Windows Telephony Service Elevation of Privilege Vulnerability\r\nCVE-2026-20932 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20934 | Windows SMB Server Elevation of Privilege Vulnerability\r\nCVE-2026-20936 | Windows NDIS Information Disclosure Vulnerability\r\nCVE-2026-20937 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20939 | Windows File Explorer Information Disclosure Vulnerability\r\nCVE-2026-20940 | Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability\r\nCVE-2026-20962 | Dynamic Root of Trust for Measurement (DRTM) Information Disclosure Vulnerability\r\nCVE-2026-21265 | Secure Boot Certificate Expiration Security Feature Bypass Vulnerability",
  "link": "https://jvndb.jvn.jp/en/contents/2026/JVNDB-2026-004359.html",
  "sec:cpe": {
    "#text": "cpe:/h:hitachi:virtual_storage_platform",
    "@product": "Hitachi Virtual Storage Platform",
    "@vendor": "Hitachi, Ltd",
    "@version": "2.2"
  },
  "sec:identifier": "JVNDB-2026-004359",
  "sec:references": [
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2023-31096",
      "@id": "CVE-2023-31096",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2024-55414",
      "@id": "CVE-2024-55414",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20804",
      "@id": "CVE-2026-20804",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20805",
      "@id": "CVE-2026-20805",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20809",
      "@id": "CVE-2026-20809",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20810",
      "@id": "CVE-2026-20810",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20812",
      "@id": "CVE-2026-20812",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20814",
      "@id": "CVE-2026-20814",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20816",
      "@id": "CVE-2026-20816",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20817",
      "@id": "CVE-2026-20817",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20820",
      "@id": "CVE-2026-20820",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20821",
      "@id": "CVE-2026-20821",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20822",
      "@id": "CVE-2026-20822",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20823",
      "@id": "CVE-2026-20823",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20824",
      "@id": "CVE-2026-20824",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20825",
      "@id": "CVE-2026-20825",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20826",
      "@id": "CVE-2026-20826",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20827",
      "@id": "CVE-2026-20827",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20828",
      "@id": "CVE-2026-20828",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20829",
      "@id": "CVE-2026-20829",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20831",
      "@id": "CVE-2026-20831",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20832",
      "@id": "CVE-2026-20832",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20834",
      "@id": "CVE-2026-20834",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20836",
      "@id": "CVE-2026-20836",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20837",
      "@id": "CVE-2026-20837",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20839",
      "@id": "CVE-2026-20839",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20840",
      "@id": "CVE-2026-20840",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20842",
      "@id": "CVE-2026-20842",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20843",
      "@id": "CVE-2026-20843",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20844",
      "@id": "CVE-2026-20844",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20847",
      "@id": "CVE-2026-20847",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20848",
      "@id": "CVE-2026-20848",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20849",
      "@id": "CVE-2026-20849",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20852",
      "@id": "CVE-2026-20852",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20853",
      "@id": "CVE-2026-20853",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20856",
      "@id": "CVE-2026-20856",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20857",
      "@id": "CVE-2026-20857",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20858",
      "@id": "CVE-2026-20858",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20860",
      "@id": "CVE-2026-20860",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20861",
      "@id": "CVE-2026-20861",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20862",
      "@id": "CVE-2026-20862",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20864",
      "@id": "CVE-2026-20864",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20865",
      "@id": "CVE-2026-20865",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20866",
      "@id": "CVE-2026-20866",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20867",
      "@id": "CVE-2026-20867",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20868",
      "@id": "CVE-2026-20868",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20869",
      "@id": "CVE-2026-20869",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20871",
      "@id": "CVE-2026-20871",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20872",
      "@id": "CVE-2026-20872",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20873",
      "@id": "CVE-2026-20873",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20874",
      "@id": "CVE-2026-20874",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20875",
      "@id": "CVE-2026-20875",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20877",
      "@id": "CVE-2026-20877",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20918",
      "@id": "CVE-2026-20918",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20919",
      "@id": "CVE-2026-20919",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20921",
      "@id": "CVE-2026-20921",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20922",
      "@id": "CVE-2026-20922",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20923",
      "@id": "CVE-2026-20923",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20924",
      "@id": "CVE-2026-20924",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20925",
      "@id": "CVE-2026-20925",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20926",
      "@id": "CVE-2026-20926",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20927",
      "@id": "CVE-2026-20927",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20929",
      "@id": "CVE-2026-20929",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20931",
      "@id": "CVE-2026-20931",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20932",
      "@id": "CVE-2026-20932",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20934",
      "@id": "CVE-2026-20934",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20936",
      "@id": "CVE-2026-20936",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20937",
      "@id": "CVE-2026-20937",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20939",
      "@id": "CVE-2026-20939",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20940",
      "@id": "CVE-2026-20940",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-20962",
      "@id": "CVE-2026-20962",
      "@source": "CVE"
    },
    {
      "#text": "https://www.cve.org/CVERecord?id=CVE-2026-21265",
      "@id": "CVE-2026-21265",
      "@source": "CVE"
    },
    {
      "#text": "https://msrc.microsoft.com/update-guide/en-us",
      "@id": "https://msrc.microsoft.com/update-guide/en-us",
      "@source": "Related document"
    }
  ],
  "title": "Security information for Hitachi Disk Array Systems"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…