CVE-2025-65116
Received Received - Intake
Buffer Overflow in Hitachi JP1 Desktop Management on Windows

Publication date: 2026-04-07

Last updated on: 2026-04-28

Assigner: Hitachi, Ltd.

Description
Buffer Overflow Vulnerability in JP1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management 2 - Operations Director on Windows, Job Management Partner 1/IT Desktop Management 2 - Manager on Windows, JP1/IT Desktop Management - Manager on Windows, Job Management Partner 1/IT Desktop Management - Manager on Windows, JP1/NETM/DM Manager on Windows, JP1/NETM/DM Client on Windows, Job Management Partner 1/Software Distribution Manager on Windows, Job Management Partner 1/Software Distribution Client on Windows.This issue affects JP1/IT Desktop Management 2 - Manager: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; JP1/IT Desktop Management 2 - Operations Director: from 13-50 before 13-50-02, from 13-11 before 13-11-04, from 13-10 before 13-10-07, from 13-01 before 13-01-07, from 13-00 before 13-00-05, from 12-60 before 12-60-12, from 10-50 through 12-50-11; Job Management Partner 1/IT Desktop Management 2 - Manager: from 10-50 through 10-50-11; JP1/IT Desktop Management - Manager: from 09-50 through 10-10-16; Job Management Partner 1/IT Desktop Management - Manager: from 09-50 through 10-10-16; JP1/NETM/DM Manager: from 09-00 through 10-20-02; JP1/NETM/DM Client: from 09-00 through 10-20-02; Job Management Partner 1/Software Distribution Manager: from 09-00 through 09-51-13; Job Management Partner 1/Software Distribution Client: from 09-00 through 09-51-13.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-07
Last Modified
2026-04-28
Generated
2026-05-07
AI Q&A
2026-04-07
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 52 associated CPEs
Vendor Product Version / Range
hitachi job_management_partner_1/it_desktop_management-manager From 10-10 (inc) to 10-10-16 (inc)
hitachi job_management_partner_1/it_desktop_management-manager From 09-50 (inc) to 09-50-03 (inc)
hitachi job_management_partner_1/it_desktop_management-manager From 09-51 (inc) to 09-51-05 (inc)
hitachi job_management_partner_1/it_desktop_management-manager From 10-00 (inc) to 10-00-02 (inc)
hitachi job_management_partner_1/it_desktop_management-manager From 10-01 (inc) to 10-01-05 (inc)
hitachi job_management_partner_1/it_desktop_management-manager From 10-02 (inc) to 10-02-05 (inc)
hitachi jp1/it_desktop_management_2-manager From 10-50 (inc) to 10-50-12 (inc)
hitachi jp1/it_desktop_management_2-manager From 11-00 (inc) to 11-00-11 (inc)
hitachi jp1/it_desktop_management_2-manager From 11-01 (inc) to 11-01-12 (inc)
hitachi jp1/it_desktop_management_2-manager From 11-10 (inc) to 11-10-10 (inc)
hitachi jp1/it_desktop_management_2-manager From 11-50 (inc) to 11-50-08 (inc)
hitachi jp1/it_desktop_management_2-manager From 11-51 (inc) to 11-51-10 (inc)
hitachi jp1/it_desktop_management_2-manager From 12-00 (inc) to 12-00-09 (inc)
hitachi jp1/it_desktop_management_2-manager From 12-10 (inc) to 12-10-12 (inc)
hitachi jp1/it_desktop_management_2-manager From 12-50 (inc) to 12-50-11 (inc)
hitachi jp1/it_desktop_management_2-manager From 12-60 (inc) to 12-60-11 (inc)
hitachi jp1/it_desktop_management_2-manager From 13-00 (inc) to 13-00-04 (inc)
hitachi jp1/it_desktop_management_2-manager From 13-01 (inc) to 13-01-06 (inc)
hitachi jp1/it_desktop_management_2-manager From 13-10 (inc) to 13-10-06 (inc)
hitachi jp1/it_desktop_management_2-manager From 13-11 (inc) to 13-11-03 (inc)
hitachi jp1/it_desktop_management_2-manager From 13-50 (inc) to 13-50-01 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 11-01 (inc) to 11-01-12 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 11-10 (inc) to 11-10-10 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 11-50 (inc) to 11-50-08 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 11-51 (inc) to 11-51-10 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 12-00 (inc) to 12-00-09 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 10-50 (inc) to 10-50-12 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 11-00 (inc) to 11-00-11 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 12-10 (inc) to 12-10-12 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 12-50 (inc) to 12-50-11 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 12-60 (inc) to 12-60-11 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 13-00 (inc) to 13-00-04 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 13-01 (inc) to 13-01-06 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 13-10 (inc) to 13-10-06 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 13-11 (inc) to 13-11-03 (inc)
hitachi jp1/it_desktop_management_2-operations_director From 13-50 (inc) to 13-50-01 (inc)
hitachi jp1/netm/dm_manager From 09-00 (inc) to 09-00-14 (inc)
hitachi jp1/netm/dm_manager From 09-01 (inc) to 09-01-14 (inc)
hitachi jp1/netm/dm_manager From 09-10 (inc) to 09-10-15 (inc)
hitachi jp1/netm/dm_manager From 09-50 (inc) to 09-50-20 (inc)
hitachi jp1/netm/dm_manager From 09-51 (inc) to 09-51-14 (inc)
hitachi jp1/netm/dm_manager From 09-12 (inc) to 09-12-16 (inc)
hitachi jp1/netm/dm_manager From 10-10 (inc) to 10-10-25 (inc)
hitachi jp1/netm/dm_manager From 10-20 (inc) to 10-20-02 (inc)
hitachi jp1/netm/dm_client From 09-00 (inc) to 09-00-14 (inc)
hitachi jp1/netm/dm_client From 09-01 (inc) to 09-01-14 (inc)
hitachi jp1/netm/dm_client From 09-10 (inc) to 09-10-15 (inc)
hitachi jp1/netm/dm_client From 09-12 (inc) to 09-12-16 (inc)
hitachi jp1/netm/dm_client From 09-50 (inc) to 09-50-20 (inc)
hitachi jp1/netm/dm_client From 09-51 (inc) to 09-51-14 (inc)
hitachi jp1/netm/dm_client From 10-10 (inc) to 10-10-25 (inc)
hitachi jp1/netm/dm_client From 10-20 (inc) to 10-20-02 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
CWE-763 The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-65116 is a medium-severity buffer overflow vulnerability affecting various Hitachi JP1/IT Desktop Management 2 and JP1/NETM/DM products running on Windows.

This vulnerability occurs when the software improperly handles input data, causing a buffer overflow condition that can crash the affected software.

The vulnerability requires local access with low privileges and does not require user interaction to be exploited.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) condition, where the affected software can crash due to the buffer overflow.

There is no impact on confidentiality or integrity, but availability is highly affected.

An attacker with local access and low privileges can exploit this vulnerability to disrupt the normal operation of the affected software.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

There are no specific detection commands or network/system detection methods provided for this vulnerability in the available information.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users should upgrade affected products to the fixed versions released by Hitachi.

  • Upgrade JP1/IT Desktop Management 2 - Manager to versions 13-50-03, 13-11-04, 13-10-07, 13-01-07, 13-00-05, or 12-60-12.
  • Upgrade JP1/IT Desktop Management 2 - Operations Director to the same fixed versions as above.
  • Upgrade JP1/NETM/DM Manager and Client to version 10-30 or later.

No workarounds are provided, so upgrading to fixed versions is the recommended immediate action.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this buffer overflow vulnerability in Hitachi's JP1/IT Desktop Management 2 and related products affects compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart