Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-10205

Summary
Assigner-Hitachi
Assigner Org ID-50d0f415-c707-4733-9afc-8f6c0e9b3f82
Published At-17 Dec, 2024 | 01:16
Updated At-17 Dec, 2024 | 14:57
Rejected At-
Credits

Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer

Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics component ).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Hitachi
Assigner Org ID:50d0f415-c707-4733-9afc-8f6c0e9b3f82
Published At:17 Dec, 2024 | 01:16
Updated At:17 Dec, 2024 | 14:57
Rejected At:
▼CVE Numbering Authority (CNA)
Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer

Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics component ).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.

Affected Products
Vendor
Hitachi, Ltd.Hitachi
Product
Hitachi Ops Center Analyzer
Modules
  • Hitachi Ops Center Analyzer detail view
Platforms
  • Linux
  • 64 bit
Default Status
unaffected
Versions
Affected
  • From 10.0.0-00 before 11.0.3-00 (custom)
    • -> unaffectedfrom11.0.3-00
Vendor
Hitachi, Ltd.Hitachi
Product
Hitachi Infrastructure Analytics Advisor
Modules
  • Hitachi Data Center Analytics
Platforms
  • Linux
  • 64 bit
Default Status
unaffected
Versions
Affected
  • From 2.1.0-00 through 4.4.0-00 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-306CWE-306 Missing Authentication for Critical Function
Type: CWE
CWE ID: CWE-306
Description: CWE-306 Missing Authentication for Critical Function
Metrics
VersionBase scoreBase severityVector
3.19.4CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Version: 3.1
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-115CAPEC-115 Authentication Bypass
CAPEC ID: CAPEC-115
Description: CAPEC-115 Authentication Bypass
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-151/index.html
vendor-advisory
Hyperlink: https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-151/index.html
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:hirt@hitachi.co.jp
Published At:17 Dec, 2024 | 02:15
Updated At:15 Apr, 2026 | 00:35

Authentication Bypass vulnerability in Hitachi Ops Center Analyzer on Linux, 64 bit (Hitachi Ops Center Analyzer detail view component), Hitachi Infrastructure Analytics Advisor on Linux, 64 bit (Hitachi Data Center Analytics component ).This issue affects Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.3-00; Hitachi Infrastructure Analytics Advisor: from 2.1.0-00 through 4.4.0-00.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.4CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.4
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
CPE Matches

Weaknesses
CWE IDTypeSource
CWE-306Secondaryhirt@hitachi.co.jp
CWE ID: CWE-306
Type: Secondary
Source: hirt@hitachi.co.jp
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-151/index.htmlhirt@hitachi.co.jp
N/A
Hyperlink: https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2024-151/index.html
Source: hirt@hitachi.co.jp
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

10Records found

CVE-2025-66445
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.1||HIGH
EPSS-0.05% / 16.09%
||
7 Day CHG~0.00%
Published-24 Dec, 2025 | 04:52
Updated-29 Dec, 2025 | 15:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer

Authorization bypass vulnerability in Hitachi Infrastructure Analytics Advisor (Data Center Analytics component) and Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component).This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.

Action-Not Available
Vendor-Hitachi, Ltd.
Product-Hitachi Infrastructure Analytics AdvisorHitachi Ops Center Analyzer
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-7125
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-0.03% / 8.69%
||
7 Day CHG~0.00%
Published-27 Aug, 2024 | 04:15
Updated-21 Jan, 2025 | 19:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass Vulnerability in Hitachi Ops Center Common Services

Authentication Bypass vulnerability in Hitachi Ops Center Common Services.This issue affects Hitachi Ops Center Common Services: from 10.9.3-00 before 11.0.2-01.

Action-Not Available
Vendor-Linux Kernel Organization, IncHitachi, Ltd.
Product-ops_center_common_serviceslinux_kernelHitachi Ops Center Common Servicesops_center_common_services
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2024-9137
Matching Score-4
Assigner-Moxa Inc.
ShareView Details
Matching Score-4
Assigner-Moxa Inc.
CVSS Score-8.8||HIGH
EPSS-0.15% / 34.82%
||
7 Day CHG~0.00%
Published-14 Oct, 2024 | 08:09
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Moxa Service Missing Authentication for Critical Function

The affected product lacks an authentication check when sending commands to the server via the Moxa service. This vulnerability allows an attacker to execute specified commands, potentially leading to unauthorized downloads or uploads of configuration files and system compromise.

Action-Not Available
Vendor-Moxa Inc.
Product-OnCell G4302-LTE4 SeriesEDS-P506E SeriesEDS-510A SeriesEDS-P510 SeriesEDS-608 SeriesICS-G7852A SeriesNAT-102 SeriesSDS-3006 SeriesICS-G7848A SeriesEDS-616 SeriesEDR-8010 SeriesEDS-611 SeriesSDS-3010 SeriesEDS-P510A SeriesEDR-G9010 SeriesTN-4900 SeriesIKS-6728A SeriesICS-G7826A SeriesICS-G7752A SeriesEDS-508A SeriesICS-G7750A SeriesICS-G7850A SeriesICS-G7748A SeriesEDS-528E SeriesPT-7728 SeriesPT-G7828 SeriesIKS-G6824A SeriesTN-G6500 SeriesSDS-G3006 SeriesEDF-G1002-BP SeriesEDS-G516E SeriesEDS-516A SeriesICS-G7528A SeriesSDS-G3008 SeriesPT-7828 SeriesEDS-408A SeriesEDS-G509 SeriesEDR-G9004 SeriesPT-G7728 SeriesEDS-510E SeriesPT-G510 SeriesICS-G7526A SeriesEDS-405A SeriesSDS-3008 SeriesSDS-G3010 SeriesTN-G4500 SeriesEDS-619 SeriesPT-G503 SeriesSDS-3016 SeriesIKS-6726A SeriesEDS-G512E SeriesSDS-G3016 SeriesEDS-505A SeriesEDS-518A SeriesEDS-518E SeriesIKS-G6524A SeriesTN-5500A SeriesEDS-G508E SeriesTN-4500A SeriesICS-G7828A Seriesedr-g9010tn-4900edr-g9004nat-102edf-g1002-bpedr-8010oncell_g4302-lte4
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2025-70141
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.4||CRITICAL
EPSS-0.58% / 69.03%
||
7 Day CHG~0.00%
Published-18 Feb, 2026 | 00:00
Updated-23 Feb, 2026 | 15:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SourceCodester Customer Support System 1.0 contains an incorrect access control vulnerability in ajax.php. The AJAX dispatcher does not enforce authentication or authorization before invoking administrative methods in admin_class.php based on the action parameter. An unauthenticated remote attacker can perform sensitive operations such as creating customers and deleting users (including the admin account), as well as modifying or deleting other application records (tickets, departments, comments), resulting in unauthorized data modification.

Action-Not Available
Vendor-n/aoretnom23
Product-customer_support_systemn/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2019-17354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.4||CRITICAL
EPSS-0.30% / 53.15%
||
7 Day CHG~0.00%
Published-09 Oct, 2019 | 11:57
Updated-05 Aug, 2024 | 01:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

wan.htm page on Zyxel NBG-418N v2 with firmware version V1.00(AARP.9)C0 can be accessed directly without authentication, which can lead to disclosure of information about the WAN, and can also be leveraged by an attacker to modify data fields of the page.

Action-Not Available
Vendor-n/aZyxel Networks Corporation
Product-nbg-418n_v2nbg-418n_v2_firmwaren/a
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-42569
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.4||CRITICAL
EPSS-3.26% / 87.29%
||
7 Day CHG+3.22%
Published-09 May, 2026 | 19:21
Updated-12 May, 2026 | 18:31
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
phpvms: /importer authorization bypass causing full database wipe

phpVMS is a PHP application to run and simulate an airline. Prior to version 7.0.6, a critical vulnerability in phpVMS allowed unauthenticated access to a legacy import feature. This issue has been patched in version 7.0.6.

Action-Not Available
Vendor-phpvms
Product-phpvms
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-862
Missing Authorization
CVE-2026-3893
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.4||CRITICAL
EPSS-0.07% / 22.45%
||
7 Day CHG~0.00%
Published-28 Apr, 2026 | 17:34
Updated-29 Apr, 2026 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Carlson Software VASCO-B GNSS Receiver Missing Authentication for Critical Function

The Carlson VASCO-B GNSS Receiver lacks an authentication mechanism, allowing an attacker with network access to directly access and modify its configuration and operational functions without needing credentials.

Action-Not Available
Vendor-Carlson Software
Product-VASCO-B GNSS Receiver
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-44592
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.02% / 4.42%
||
7 Day CHG~0.00%
Published-14 May, 2026 | 18:39
Updated-16 May, 2026 | 00:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Gradient: Unauthenticated worker on /proto → arbitrary NAR write / cache poisoning

Gradient is a nix-based continuous integration system. In 1.1.0, when GRADIENT_DISCOVERABLE=true (the default, and the NixOS module default), anyone who can reach /proto can register as a worker without any credentials by sending a fresh, never-registered worker UUID. The resulting session has PeerAuth::Open, i.e. it sees jobs from every organisation, and can immediately NarPush/NarUploaded arbitrary store paths into nar_storage and the cached_path table. This vulnerability is fixed in 1.1.1.

Action-Not Available
Vendor-wavelens
Product-gradient
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CWE ID-CWE-862
Missing Authorization
CVE-2022-26833
Matching Score-4
Assigner-Talos
ShareView Details
Matching Score-4
Assigner-Talos
CVSS Score-9.4||CRITICAL
EPSS-92.05% / 99.72%
||
7 Day CHG~0.00%
Published-25 May, 2022 | 20:15
Updated-16 Sep, 2024 | 23:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An improper authentication vulnerability exists in the REST API functionality of Open Automation Software OAS Platform V16.00.0121. A specially-crafted series of HTTP requests can lead to unauthenticated use of the REST API. An attacker can send a series of HTTP requests to trigger this vulnerability.

Action-Not Available
Vendor-openautomationsoftwareOpen Automation Software
Product-oas_platformOAS Platform
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2020-10265
Matching Score-4
Assigner-Alias Robotics S.L.
ShareView Details
Matching Score-4
Assigner-Alias Robotics S.L.
CVSS Score-9.4||CRITICAL
EPSS-0.36% / 58.15%
||
7 Day CHG~0.00%
Published-06 Apr, 2020 | 12:08
Updated-17 Sep, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
RVD#1443: UR dashboard server enables unauthenticated remote control of core robot functions

Universal Robots Robot Controllers Version CB2 SW Version 1.4 upwards, CB3 SW Version 3.0 and upwards, e-series SW Version 5.0 and upwards expose a service called DashBoard server at port 29999 that allows for control over core robot functions like starting/stopping programs, shutdown, reset safety and more. The DashBoard server is not protected by any kind of authentication or authorization.

Action-Not Available
Vendor-universal-robotsUniversal Robots
Product-ur3eur10ur3ur5ur10eur5eur_softwareUniversal Robots Robot Controllers CB 2, CB3, e-series
CWE ID-CWE-306
Missing Authentication for Critical Function
Details not found