Vulnerability Details : CVE-2020-36695
Incorrect Default Permissions vulnerability in Hitachi Device Manager on Linux (Device Manager Server component), Hitachi Tiered Storage Manager on Linux, Hitachi Replication Manager on Linux, Hitachi Tuning Manager on Linux (Hitachi Tuning Manager server, Hitachi Tuning Manager - Agent for RAID, Hitachi Tuning Manager - Agent for NAS
components), Hitachi Compute Systems Manager on Linux allows File Manipulation.This issue affects Hitachi Device Manager: before 8.8.5-02; Hitachi Tiered Storage Manager: before 8.8.5-02; Hitachi Replication Manager: before 8.8.5-02; Hitachi Tuning Manager: before 8.8.5-02; Hitachi Compute Systems Manager: before 8.8.3-08.
Products affected by CVE-2020-36695
- cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:replication_manager:*:*:*:*:*:*:*:*
- cpe:2.3:a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36695
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36695
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.6
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H |
1.8
|
4.7
|
Hitachi, Ltd. | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2020-36695
-
During installation, installed file permissions are set to allow anyone to modify those files.Assigned by:
- hirt@hitachi.co.jp (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-36695
-
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html
File and Directory Permissions Vulnerability in Hitachi Command Suite: Software Vulnerability Information: Software: HitachiVendor Advisory
Jump to