Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-36695 : What You Need to Know

Learn about CVE-2020-36695, an Incorrect Default Permissions vulnerability in Hitachi products on Linux, allowing File Manipulation. Discover impacts, affected systems, and mitigation steps.

This CVE-2020-36695 article provides insights into a File and Directory Permission Vulnerability in Hitachi Command Suite.

Understanding CVE-2020-36695

What is CVE-2020-36695?

The CVE-2020-36695 vulnerability involves an Incorrect Default Permissions issue in various Hitachi products on Linux, allowing File Manipulation.

The Impact of CVE-2020-36695

The vulnerability has a base score of 6.6, indicating a medium severity level. It can lead to high availability impact due to file manipulation.

Technical Details of CVE-2020-36695

Vulnerability Description

The vulnerability arises from Incorrect Default Permissions in Hitachi Device Manager, Tiered Storage Manager, Replication Manager, Tuning Manager, and Compute Systems Manager on Linux.

Affected Systems and Versions

        Hitachi Device Manager: before 8.8.5-02
        Hitachi Tiered Storage Manager: before 8.8.5-02
        Hitachi Replication Manager: before 8.8.5-02
        Hitachi Tuning Manager: before 8.8.5-02
        Hitachi Compute Systems Manager: before 8.8.3-08

Exploitation Mechanism

The vulnerability allows attackers to manipulate files due to incorrect default permissions, potentially leading to unauthorized access and data compromise.

Mitigation and Prevention

Immediate Steps to Take

        Apply security patches provided by Hitachi for the affected products and versions.
        Monitor system logs for any suspicious file manipulation activities.
        Restrict access to vulnerable systems and components.

Long-Term Security Practices

        Regularly update and patch all software and systems to prevent vulnerabilities.
        Conduct security audits and assessments to identify and address potential security gaps.
        Educate users and administrators on best practices for file and directory permissions.

Patching and Updates

Ensure that all Hitachi products mentioned are updated to versions 8.8.5-02 or higher to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now