Hitachi JP1/IT Desktop Management 2 Agent 9 through 12 calls the SendMessageTimeoutW API with arbitrary arguments via a local pipe, leading to a local privilege escalation vulnerability. An attacker who exploits this issue could execute arbitrary code on the local system.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
hitachi job_management_partner_1\\/remote_control_agent |
||
hitachi it_operations_director |
||
hitachi job_management_partner_1\\/it_desktop_management-manager |
||
hitachi job_management_partner_1\\/software_distribution_client |
||
hitachi job_management_partner_1\\/software_distribution_manager |
||
hitachi jp1\\/it_desktop_management_2-operations_director |
||
hitachi job_management_partner_1\\/it_desktop_management_2-manager |
||
hitachi jp1\\/it_desktop_management-manager |
||
hitachi jp1\\/it_desktop_management_2-manager |
||
hitachi jp1\\/netm\\/dm_client |
||
hitachi jp1\\/netm\\/dm_manager |
||
hitachi jp1\\/netm\\/dm_client-remote_control_feature |
||
hitachi jp1\\/netm\\/remote_control_feature |
||
hitachi jp1\\/remote_control_feature |