{"api_version":"1","generated_at":"2026-04-23T04:33:19+00:00","cve":"CVE-2020-36695","urls":{"html":"https://cve.report/CVE-2020-36695","api":"https://cve.report/api/cve/CVE-2020-36695.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-36695","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-36695"},"summary":{"title":"CVE-2020-36695","description":"Incorrect Default Permissions vulnerability in Hitachi Device Manager on Linux (Device Manager Server component), Hitachi Tiered Storage Manager on Linux, Hitachi Replication Manager on Linux, Hitachi Tuning Manager on Linux (Hitachi Tuning Manager server, Hitachi Tuning Manager - Agent for RAID, Hitachi Tuning Manager - Agent for NAS \n\ncomponents), Hitachi Compute Systems Manager on Linux allows File Manipulation.This issue affects Hitachi Device Manager: before 8.8.5-02; Hitachi Tiered Storage Manager: before 8.8.5-02; Hitachi Replication Manager: before 8.8.5-02; Hitachi Tuning Manager: before 8.8.5-02; Hitachi Compute Systems Manager: before 8.8.3-08.","state":"PUBLIC","assigner":"hirt@hitachi.co.jp","published_at":"2023-07-18 03:15:00","updated_at":"2023-07-27 17:30:00"},"problem_types":["CWE-276"],"metrics":[],"references":[{"url":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html","name":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html","refsource":"MISC","tags":[],"title":"File and Directory Permissions Vulnerability in Hitachi Command Suite: Software Vulnerability Information: Software: Hitachi","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-36695","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36695","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"36695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hitachi","cpe5":"compute_systems_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hitachi","cpe5":"device_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hitachi","cpe5":"replication_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hitachi","cpe5":"tiered_storage_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36695","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"hitachi","cpe5":"tuning_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"36695","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2020-36695","ASSIGNER":"hirt@hitachi.co.jp","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"Incorrect Default Permissions vulnerability in Hitachi Device Manager on Linux (Device Manager Server component), Hitachi Tiered Storage Manager on Linux, Hitachi Replication Manager on Linux, Hitachi Tuning Manager on Linux (Hitachi Tuning Manager server, Hitachi Tuning Manager - Agent for RAID, Hitachi Tuning Manager - Agent for NAS \n\ncomponents), Hitachi Compute Systems Manager on Linux allows File Manipulation.This issue affects Hitachi Device Manager: before 8.8.5-02; Hitachi Tiered Storage Manager: before 8.8.5-02; Hitachi Replication Manager: before 8.8.5-02; Hitachi Tuning Manager: before 8.8.5-02; Hitachi Compute Systems Manager: before 8.8.3-08.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-276 Incorrect Default Permissions","cweId":"CWE-276"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Hitachi","product":{"product_data":[{"product_name":"Hitachi Device Manager","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"8.8.5-02","status":"unaffected"}],"lessThan":"8.8.5-02","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"unaffected"}}]}},{"product_name":"Hitachi Tiered Storage Manager","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"8.8.5-02","status":"unaffected"}],"lessThan":"8.8.5-02","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"unaffected"}}]}},{"product_name":"Hitachi Replication Manager","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"8.8.5-02","status":"unaffected"}],"lessThan":"8.8.5-02","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"unaffected"}}]}},{"product_name":"Hitachi Tuning Manager","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"8.8.5-02","status":"unaffected"}],"lessThan":"8.8.5-02","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"unaffected"}}]}},{"product_name":"Hitachi Compute Systems Manager","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"8.8.3-08","status":"unaffected"}],"lessThan":"8.8.3-08","status":"affected","version":"0","versionType":"custom"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html","refsource":"MISC","name":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2023-124/index.html"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"advisory":"hitachi-sec-2023-124","discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.6,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-18 03:15:00","lastModifiedDate":"2023-07-27 17:30:00","problem_types":["CWE-276"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hitachi:compute_systems_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.8.3-08","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hitachi:device_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.8.5-02","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hitachi:replication_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.8.5-02","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hitachi:tiered_storage_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.8.5-02","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:hitachi:tuning_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"8.8.5-02","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}