CVE-2025-65116
Buffer Overflow in Hitachi JP1 Desktop Management on Windows
Publication date: 2026-04-07
Last updated on: 2026-04-28
Assigner: Hitachi, Ltd.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| hitachi | job_management_partner_1/it_desktop_management-manager | From 10-10 (inc) to 10-10-16 (inc) |
| hitachi | job_management_partner_1/it_desktop_management-manager | From 09-50 (inc) to 09-50-03 (inc) |
| hitachi | job_management_partner_1/it_desktop_management-manager | From 09-51 (inc) to 09-51-05 (inc) |
| hitachi | job_management_partner_1/it_desktop_management-manager | From 10-00 (inc) to 10-00-02 (inc) |
| hitachi | job_management_partner_1/it_desktop_management-manager | From 10-01 (inc) to 10-01-05 (inc) |
| hitachi | job_management_partner_1/it_desktop_management-manager | From 10-02 (inc) to 10-02-05 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 10-50 (inc) to 10-50-12 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 11-00 (inc) to 11-00-11 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 11-01 (inc) to 11-01-12 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 11-10 (inc) to 11-10-10 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 11-50 (inc) to 11-50-08 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 11-51 (inc) to 11-51-10 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 12-00 (inc) to 12-00-09 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 12-10 (inc) to 12-10-12 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 12-50 (inc) to 12-50-11 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 12-60 (inc) to 12-60-11 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 13-00 (inc) to 13-00-04 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 13-01 (inc) to 13-01-06 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 13-10 (inc) to 13-10-06 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 13-11 (inc) to 13-11-03 (inc) |
| hitachi | jp1/it_desktop_management_2-manager | From 13-50 (inc) to 13-50-01 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 11-01 (inc) to 11-01-12 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 11-10 (inc) to 11-10-10 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 11-50 (inc) to 11-50-08 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 11-51 (inc) to 11-51-10 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 12-00 (inc) to 12-00-09 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 10-50 (inc) to 10-50-12 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 11-00 (inc) to 11-00-11 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 12-10 (inc) to 12-10-12 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 12-50 (inc) to 12-50-11 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 12-60 (inc) to 12-60-11 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 13-00 (inc) to 13-00-04 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 13-01 (inc) to 13-01-06 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 13-10 (inc) to 13-10-06 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 13-11 (inc) to 13-11-03 (inc) |
| hitachi | jp1/it_desktop_management_2-operations_director | From 13-50 (inc) to 13-50-01 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-00 (inc) to 09-00-14 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-01 (inc) to 09-01-14 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-10 (inc) to 09-10-15 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-50 (inc) to 09-50-20 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-51 (inc) to 09-51-14 (inc) |
| hitachi | jp1/netm/dm_manager | From 09-12 (inc) to 09-12-16 (inc) |
| hitachi | jp1/netm/dm_manager | From 10-10 (inc) to 10-10-25 (inc) |
| hitachi | jp1/netm/dm_manager | From 10-20 (inc) to 10-20-02 (inc) |
| hitachi | jp1/netm/dm_client | From 09-00 (inc) to 09-00-14 (inc) |
| hitachi | jp1/netm/dm_client | From 09-01 (inc) to 09-01-14 (inc) |
| hitachi | jp1/netm/dm_client | From 09-10 (inc) to 09-10-15 (inc) |
| hitachi | jp1/netm/dm_client | From 09-12 (inc) to 09-12-16 (inc) |
| hitachi | jp1/netm/dm_client | From 09-50 (inc) to 09-50-20 (inc) |
| hitachi | jp1/netm/dm_client | From 09-51 (inc) to 09-51-14 (inc) |
| hitachi | jp1/netm/dm_client | From 10-10 (inc) to 10-10-25 (inc) |
| hitachi | jp1/netm/dm_client | From 10-20 (inc) to 10-20-02 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-120 | The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer. |
| CWE-763 | The product attempts to return a memory resource to the system, but it calls the wrong release function or calls the appropriate release function incorrectly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-65116 is a medium-severity buffer overflow vulnerability affecting various Hitachi JP1/IT Desktop Management 2 and JP1/NETM/DM products running on Windows.
This vulnerability occurs when the software improperly handles input data, causing a buffer overflow condition that can crash the affected software.
The vulnerability requires local access with low privileges and does not require user interaction to be exploited.
How can this vulnerability impact me? :
The primary impact of this vulnerability is a denial of service (DoS) condition, where the affected software can crash due to the buffer overflow.
There is no impact on confidentiality or integrity, but availability is highly affected.
An attacker with local access and low privileges can exploit this vulnerability to disrupt the normal operation of the affected software.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
There are no specific detection commands or network/system detection methods provided for this vulnerability in the available information.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, users should upgrade affected products to the fixed versions released by Hitachi.
- Upgrade JP1/IT Desktop Management 2 - Manager to versions 13-50-03, 13-11-04, 13-10-07, 13-01-07, 13-00-05, or 12-60-12.
- Upgrade JP1/IT Desktop Management 2 - Operations Director to the same fixed versions as above.
- Upgrade JP1/NETM/DM Manager and Client to version 10-30 or later.
No workarounds are provided, so upgrading to fixed versions is the recommended immediate action.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify how this buffer overflow vulnerability in Hitachi's JP1/IT Desktop Management 2 and related products affects compliance with common standards and regulations such as GDPR or HIPAA.