Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2025-0976
PUBLISHED
More InfoOfficial Page
Assigner-Hitachi
Assigner Org ID-50d0f415-c707-4733-9afc-8f6c0e9b3f82
View Known Exploited Vulnerability (KEV) details
Published At-25 Feb, 2026 | 04:17
Updated At-25 Feb, 2026 | 14:49
Rejected At-
▼CVE Numbering Authority (CNA)
Information Exposure Vulnerability in Hitachi Configuration Manager, Hitachi Ops Center API Configuration Manager

Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.4-00; Hitachi Configuration Manager: from 8.6.1-00 before 11.0.5-00.

Affected Products
Vendor
Hitachi, Ltd.Hitachi
Product
Hitachi Ops Center API Configuration Manager
Platforms
  • Windows
  • Linux
Default Status
unaffected
Versions
Affected
  • From 10.0.0-00 before 11.0.4-00 (custom)
    • -> unaffectedfrom11.0.4-00
Vendor
Hitachi, Ltd.Hitachi
Product
Hitachi Configuration Manager
Platforms
  • Windows
  • Linux
Default Status
unaffected
Versions
Affected
  • From 8.6.1-00 before 11.0.5-00 (custom)
    • -> unaffectedfrom11.0.5-00
Problem Types
TypeCWE IDDescription
CWECWE-532CWE-532 Insertion of Sensitive Information into Log File
Type: CWE
CWE ID: CWE-532
Description: CWE-532 Insertion of Sensitive Information into Log File
Metrics
VersionBase scoreBase severityVector
3.14.7MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 4.7
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-569CAPEC-569 Collect Data as Provided by Users
CAPEC ID: CAPEC-569
Description: CAPEC-569 Collect Data as Provided by Users
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-110/index.html
vendor-advisory
Hyperlink: https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-110/index.html
Resource:
vendor-advisory
▼Authorized Data Publishers (ADP)
CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Details not found