What Is the Fastest Way to Resolve My Security or Vulnerability Question?
- All Hitachi products and solutions
What's the fastest way to determine whether a given vulnerability affects my Hitachi Vantara product?
Visit the Hitachi Vantara Knowledge Base here: https://knowledge.hitachivantara.com and search for the CVE number (Important: You must have a Support Connect account. Register here if you have not already).
If a Hitachi Vantara KB article exists for that CVE number, it will usually be shown as the first result. See the article to determine if your product is vulnerable and/or if there are remediation steps available.
What if no Hitachi Vantara KB article is found for that CVE number, or the article is found but no remediation steps are shown for my product?
Submit a support case through Support Connect and make sure to include the following information to vastly decrease resolution time:
- CVE # (if available) CVE #'s are in this format: CVE-2017-0143
- Hitachi Vantara Product(s) for which you are requesting vulnerability information
Our vulnerability scanner (Qualys, Tenable/Nessus, etc) results showed an entry or entries seemingly related to my Hitachi Vantara product--what's the fastest way to resolve this?
First, ensure you're running an up-to-date version of the firmware for the product(s) in question. This alone could significantly change the scanning results.
If the vulnerability remains after updating, submit a support case, and make sure to include the following information to vastly decrease resolution time:
- Name and version of the security scanner used (e.g., Qualys, Tenable/Nessus, etc),
- Date/time the scan was conducted
- Scan result of concern
- If available, Qualys ID or Nessus Plugin ID of the positive scan result of concern
- If applicable, include the CVE#, Bugtraq ID, and/or CERT Vulnerability Number of the positive scan result of concern
- If known, state whether your organization has actually been exploited by the vulnerability of concern
- The Hitachi Vantara products involved in the scan, firmware/software version installed, the affected TCP and UDP ports, and affected IP addresses
- After submitting the case and receiving your case #, ensure that the vulnerability scan results (Qualys, Nessus, etc.) are uploaded to TUF. Click here to upload your scan results.