JustAppSec
Back to news

High-severity XSS fixed in Hitachi Ops Center Analyzer

2 min readPublished 25 Mar 2026Updated 25 Mar 2026Source: CVEProject (cvelistV5)

TL;DR — A High-severity XSS in Hitachi Ops Center Analyzer and Infrastructure Analytics Advisor can let a low-privilege user trigger script execution in another user’s browser, risking UI/session data exposure.

What happened

Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer are enterprise IT operations/analytics products used to collect, analyze, and visualize infrastructure telemetry and operational data.

CVE-2026-2072 is a cross-site scripting (XSS) vulnerability affecting Hitachi Infrastructure Analytics Advisor (Analytics probe component) and Hitachi Ops Center Analyzer. The CVE record reports CVSS v3.1 8.2 (High) with AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L, indicating the vulnerable UI path is reachable over the network, requires low privileges, and requires user interaction, with a high confidentiality impact.

XSS in operations consoles is a recurring enterprise risk because it can turn “one compromised low-privilege account” into a path for session/data theft against more privileged users who routinely browse these UIs.

Who is impacted

  • Organizations running Hitachi Infrastructure Analytics Advisor (Analytics probe component) on Linux (x64).
  • Organizations running Hitachi Ops Center Analyzer on Linux (x64) in the affected version range.
ComponentAffected versions (per Hitachi CVE record / advisory)Patched versions (per Hitachi advisory)
Hitachi Infrastructure Analytics Advisor (Analytics probe)All versions (Linux x64)Not listed in the referenced Hitachi advisory page
Hitachi Ops Center Analyzer>= 10.0.0-00, < 11.0.5-00 (Linux x64)11.0.5-00

Vendor advisory referenced by the CVE record: hitachi-sec-2026-114 (URL: https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2026-114/index.html).

What to do now

  • Follow vendor remediation guidance and apply the vendor-provided fixed product version(s).

    "Affected products and versions are listed below. Please upgrade your version to the appropriate version."

  • For Hitachi Ops Center Analyzer, prioritize upgrades to the fixed release identified by Hitachi.
  • For Hitachi Infrastructure Analytics Advisor, treat the Analytics probe component as potentially still exposed until you confirm a fixed release (or compensating guidance) via Hitachi support / the latest advisory revision.
  • Reduce exposure while patching: restrict UI access to trusted networks/users (especially accounts that can view high-value operational data) and monitor for suspicious browser-driven activity originating from the Analyzer/Advisor UI.

    "Workarounds None."


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.