Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
References
Link | Resource |
---|---|
https://www.hitachi.com/hirt/security/index.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-10-12 12:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-29645
Mitre link : CVE-2021-29645
JSON object : View
CWE
Products Affected
hitachi
- job_management_partner_1\/remote_control_agent
- jp1\/netm\/dm_client-remote_control_feature
- it_operations_director
- job_management_partner_1\/it_desktop_management-manager
- jp1\/it_desktop_management_2-operations_director
- jp1\/netm\/remote_control_feature
- jp1\/remote_control_feature
- job_management_partner_1\/software_distribution_client
- jp1\/netm\/dm_manager
- job_management_partner_1\/it_desktop_management_2-manager
- jp1\/it_desktop_management_2-manager
- jp1\/it_desktop_management-manager
- job_management_partner_1\/software_distribution_manager
- jp1\/netm\/dm_client
microsoft
- windows