{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-5781","assignerOrgId":"50d0f415-c707-4733-9afc-8f6c0e9b3f82","state":"PUBLISHED","assignerShortName":"Hitachi","dateReserved":"2025-06-06T07:01:47.194Z","datePublished":"2026-02-25T03:01:21.623Z","dateUpdated":"2026-02-26T17:00:34.754Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows","Linux"],"product":"Hitachi Ops Center API Configuration Manager","vendor":"Hitachi","versions":[{"changes":[{"at":"11.0.5-00","status":"unaffected"}],"lessThan":"11.0.5-00","status":"affected","version":"10.0.0-00","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Windows","Linux"],"product":"Hitachi Configuration Manager","vendor":"Hitachi","versions":[{"changes":[{"at":"11.0.5-00","status":"unaffected"}],"lessThan":"11.0.5-00","status":"affected","version":"8.5.1-00","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Windows","Linux"],"product":"Hitachi Device Manager","vendor":"Hitachi","versions":[{"changes":[{"at":"8.6.5-00","status":"unaffected"}],"lessThan":"8.6.5-00","status":"affected","version":"8.4.1-00","versionType":"custom"}]}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager, Hitachi Device Manager allows Session Hijacking.<p>This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.5-00; Hitachi Configuration Manager: from 8.5.1-00 before 11.0.5-00; Hitachi Device Manager: from 8.4.1-00 before 8.6.5-00.</p>"}],"value":"Information Exposure Vulnerability in Hitachi Ops Center API Configuration Manager, Hitachi Configuration Manager, Hitachi Device Manager allows Session Hijacking.This issue affects Hitachi Ops Center API Configuration Manager: from 10.0.0-00 before 11.0.5-00; Hitachi Configuration Manager: from 8.5.1-00 before 11.0.5-00; Hitachi Device Manager: from 8.4.1-00 before 8.6.5-00."}],"impacts":[{"capecId":"CAPEC-593","descriptions":[{"lang":"en","value":"CAPEC-593 Session Hijacking"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"NONE","baseScore":5.2,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-532","description":"CWE-532 Insertion of Sensitive Information into Log File","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"50d0f415-c707-4733-9afc-8f6c0e9b3f82","shortName":"Hitachi","dateUpdated":"2026-02-25T03:02:45.290Z"},"references":[{"tags":["vendor-advisory"],"url":"https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-111/index.html"}],"source":{"advisory":"hitachi-sec-2026-111","discovery":"UNKNOWN"},"title":"Information Exposure Vulnerability in Hitachi Configuration Manager, Hitachi Ops Center API Configuration Manager","x_generator":{"engine":"Vulnogram 0.5.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-26T17:00:11.430448Z","id":"CVE-2025-5781","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:00:34.754Z"}}]}}