Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66444: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Hitachi Hitachi Infrastructure Analytics Advisor

0
High
VulnerabilityCVE-2025-66444cvecve-2025-66444cwe-79
Published: Wed Dec 24 2025 (12/24/2025, 04:53:34 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi
Product: Hitachi Infrastructure Analytics Advisor

Description

Cross-site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (Data Center Analytics component) and Hitachi Ops Center Analyzer (Hitachi Ops Center Analyzer detail view component).This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.

AI-Powered Analysis

AILast updated: 12/24/2025, 05:12:42 UTC

Technical Analysis

CVE-2025-66444 is a Cross-site Scripting (XSS) vulnerability classified under CWE-79 that affects Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer, specifically versions from 10.0.0-00 up to but not including 11.0.5-00. The vulnerability stems from improper neutralization of input during web page generation, which allows an attacker to inject malicious scripts into web pages viewed by other users. The attack vector is network-based and requires low privileges (PR:L) but does require user interaction (UI:R), such as clicking a crafted link or viewing a maliciously crafted page within the affected application. The vulnerability impacts confidentiality severely (C:H), with limited impact on integrity (I:L) and availability (A:L). The scope is changed (S:C), meaning the vulnerability affects resources beyond the initially vulnerable component. Although no known exploits are currently reported in the wild, the high CVSS score of 8.2 indicates a significant risk. The affected products are used primarily for data center analytics and infrastructure monitoring, making them critical for operational visibility in enterprise environments. Attackers exploiting this vulnerability could steal sensitive information, hijack user sessions, or perform actions on behalf of authenticated users, potentially leading to further compromise within the network. The lack of available patches at the time of reporting increases the urgency for mitigation through compensating controls.

Potential Impact

For European organizations, the impact of CVE-2025-66444 is considerable due to the critical role Hitachi Infrastructure Analytics Advisor and Ops Center Analyzer play in monitoring and analyzing data center infrastructure. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, user credentials, or session tokens, undermining confidentiality and potentially enabling lateral movement within enterprise networks. This could disrupt business continuity and damage trust in IT infrastructure integrity. Given the high confidentiality impact, attackers might gain insights into infrastructure configurations or vulnerabilities, aiding further attacks. The limited integrity and availability impacts reduce the likelihood of direct system manipulation or denial of service, but the scope change means that the vulnerability could affect multiple components or users beyond the initially targeted system. European organizations relying on these Hitachi products for critical infrastructure analytics are at risk of targeted attacks, especially in sectors like finance, telecommunications, and government where data center reliability and security are paramount.

Mitigation Recommendations

1. Apply vendor patches immediately once they become available for versions prior to 11.0.5-00. 2. Until patches are released, implement strict input validation and sanitization on all user-supplied data within the affected applications to prevent script injection. 3. Deploy Content Security Policies (CSP) to restrict the execution of unauthorized scripts in browsers accessing these applications. 4. Restrict access to the affected applications to trusted users and networks, employing network segmentation and firewall rules to limit exposure. 5. Monitor application logs and network traffic for unusual activities indicative of attempted XSS exploitation, such as suspicious URL parameters or script injections. 6. Educate users about the risks of interacting with untrusted links or content within the affected applications. 7. Consider deploying Web Application Firewalls (WAF) with rules tailored to detect and block XSS payloads targeting these products. 8. Review and harden authentication and session management mechanisms to reduce the impact of potential session hijacking.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Hitachi
Date Reserved
2025-12-01T05:12:46.809Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694b763354de1641bda79407

Added to database: 12/24/2025, 5:12:19 AM

Last enriched: 12/24/2025, 5:12:42 AM

Last updated: 12/24/2025, 10:00:45 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats