
Hitachi Addresses Critical BIOS Vulnerabilities in Server Products
Tokyo, Japan – July 25, 2025 – Hitachi, Ltd. today issued a significant advisory regarding potential security risks identified within the BIOS (Basic Input/Output System) of several of its server product lines. The announcement, published on the company’s official security information portal, details vulnerabilities, including CVE-2024-7344, which could potentially impact customers operating these systems.
The advisory, titled “Server Products BIOS Vulnerability (CVE-2024-7344 and others) Impact,” released at 03:00 JST, aims to provide comprehensive information and guidance to users of affected Hitachi server hardware. Hitachi is taking proactive measures to address these findings and ensure the continued security and integrity of its customers’ IT infrastructures.
While the specific technical details of all vulnerabilities are being disclosed in a phased manner, the primary concern highlighted is related to the system’s foundational firmware, the BIOS. This critical component is responsible for initiating the system startup process and loading the operating system. Vulnerabilities in the BIOS can, in some scenarios, allow for unauthorized access or manipulation of the system at a very low level, potentially leading to data breaches or system compromise.
Hitachi’s security team has been diligently working to identify the scope of these vulnerabilities and their potential impact across their server product portfolio. The advisory clearly lists the specific product models and firmware versions that may be affected. Customers are strongly encouraged to review this list carefully to determine if their systems are within the scope of the identified risks.
In response to these findings, Hitachi has already developed and is making available updated BIOS firmware and corresponding mitigation measures. The company emphasizes the critical importance of applying these updates promptly to safeguard against potential exploitation. Detailed instructions for downloading and applying the necessary patches and firmware updates are provided within the advisory itself, along with guidance on verification procedures.
Hitachi is committed to maintaining the highest standards of security for its products and services. The company expresses its sincere apologies for any concern or inconvenience these vulnerabilities may cause. They are working closely with relevant industry bodies and security researchers to ensure a thorough and effective resolution.
Customers are advised to visit the official Hitachi security advisory page at https://www.hitachi.co.jp/products/it/server/security/info/vulnerable/hitachi_sec_2025_205.html for the most up-to-date information, including a comprehensive list of affected products, detailed technical explanations, and step-by-step instructions for remediation. Hitachi’s dedicated support teams are also available to assist customers with any questions or concerns they may have.
This proactive disclosure underscores Hitachi’s dedication to transparency and its ongoing commitment to protecting its customers from evolving cybersecurity threats.
サーバ製品におけるBIOSの脆弱性(CVE-2024-7344他)による影響について
AI has delivered the news.
The answer to the following question is obtained from Google Gemini.
日立製作所 published ‘サーバ製品におけるBIOSの脆弱性(CVE-2024-7344他)による影響について’ at 2025-07-25 03:00. Please write a detailed article about this news in a polite tone with relevant information. Please reply in English with the article only.