Description
Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.
Published: 2026-04-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An attacker can cause arbitrary code execution on a Windows system running any of Hitachi’s JP1/IT Desktop Management 2, JP1/NETM/DM, or Job Management Partner 1 components that satisfy the vulnerability matrix. The flaw, identified as CWE-73, arises from unsanitized handling of user‑controlled input, allowing execution of commands that target the underlying operating system. Successful exploitation would break confidentiality, integrity, and availability of the affected services and any data they manage.

Affected Systems

Affected vendors include Hitachi, with products JP1/IT Desktop Management 2 – Manager, Operations Director, JP1/IT Desktop Management – Manager, JP1/NETM/DM – Manager and Client, and Job Management Partner 1 – IT Desktop Management, IT Desktop Management 2 – Manager, Software Distribution Manager, and Software Distribution Client. Vulnerable versions range from 09‑50 through 10‑10‑16 for the JP1/IT Desktop Management series, from 09‑00 through 10‑20‑02 for the JP1/NETM/DM series, and from 09‑00 through 09‑51‑13 for the Job Management Partner 1 Software Distribution series. Within each series, all releases before the specified version markers (e.g., before 13‑50‑02, before 13‑11‑04, before 13‑10‑07, before 13‑01‑07, before 13‑00‑05, before 12‑60‑12, and earlier 10‑50 through 12‑50‑11) are affected.

Risk and Exploitability

The CVSS score of 8.8 classifies the vulnerability as high severity. The EPSS score is not provided, so the current exploitation probability cannot be quantified from the available data. The vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that the attack vector requires network access to the management components, as the flaw is a remote code execution vulnerability on Windows installations of the product.

Generated by OpenCVE AI on April 7, 2026 at 10:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the official Hitachi patch or upgrade to a version that is not listed as vulnerable in the advisory.
  • Verify successful remediation by performing the vendor‑recommended test steps or using the product’s verification utility.
  • If patching is not immediately feasible, isolate affected systems from external networks and apply restrictive access controls to management interfaces.
  • Continuously monitor system and application logs for signs of unauthorized code execution or other suspicious activity.

Generated by OpenCVE AI on April 7, 2026 at 10:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 07 Apr 2026 07:15:00 +0000

Type Values Removed Values Added
Description Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.
Title Remote Code Execution Vulnerability in JP1/IT Desktop Management 2 and JP1/NETM/DM
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Hitachi

Published:

Updated: 2026-04-07T13:26:20.981Z

Reserved: 2025-11-18T01:27:41.899Z

Link: CVE-2025-65115

cve-icon Vulnrichment

Updated: 2026-04-07T13:26:16.707Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-07T06:16:40.537

Modified: 2026-04-07T13:20:11.643

Link: CVE-2025-65115

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:50:06Z

Weaknesses