Description
Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-16121 | Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system. |
References
| Link | Providers |
|---|---|
| https://www.hitachi.com/hirt/security/index.html |
|
History
No history.
Subscriptions
Hitachi
Subscribe
It Operations Director
Subscribe
Job Management Partner 1\/it Desktop Management-manager
Subscribe
Job Management Partner 1\/it Desktop Management 2-manager
Subscribe
Job Management Partner 1\/remote Control Agent
Subscribe
Job Management Partner 1\/software Distribution Client
Subscribe
Job Management Partner 1\/software Distribution Manager
Subscribe
Jp1\/it Desktop Management-manager
Subscribe
Jp1\/it Desktop Management 2-manager
Subscribe
Jp1\/it Desktop Management 2-operations Director
Subscribe
Jp1\/netm\/dm Client
Subscribe
Jp1\/netm\/dm Client-remote Control Feature
Subscribe
Jp1\/netm\/dm Manager
Subscribe
Jp1\/netm\/remote Control Feature
Subscribe
Jp1\/remote Control Feature
Subscribe
Microsoft
Subscribe
Windows
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T22:11:06.115Z
Reserved: 2021-03-30T00:00:00.000Z
Link: CVE-2021-29645
No data.
Status : Modified
Published: 2021-10-12T19:15:07.677
Modified: 2024-11-21T06:01:33.630
Link: CVE-2021-29645
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD