CVE-2026-2072
Published: 25 March 2026
Summary
CVE-2026-2072 is a high-severity Cross-site Scripting (CWE-79) vulnerability in Hitachi Infrastructure Analytics (inferred from references). Its CVSS base score is 8.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-15 (Information Output Filtering).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely remediation of the specific XSS flaw through vendor-recommended upgrades to version 11.0.5-00 or later.
Filters information outputs to encode or escape user-supplied data, preventing malicious script execution in cross-site contexts.
Validates all user inputs to the Analytics probe component, blocking malicious payloads that could lead to XSS exploitation.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
XSS in authenticated web app directly enables exploitation of public-facing application (T1190) and facilitates browser session hijacking or web session cookie theft for data exfiltration (T1185, T1539).
NVD Description
Cross-Site Scripting vulnerability in Hitachi Infrastructure Analytics Advisor (Analytics probe component), Hitachi Ops Center Analyzer.This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.5-00.
Deeper analysisAI
CVE-2026-2072 is a Cross-Site Scripting (XSS) vulnerability (CWE-79) in the Analytics probe component of Hitachi Infrastructure Analytics Advisor and Hitachi Ops Center Analyzer. It affects versions of these products from 10.0.0-00 before 11.0.5-00. The vulnerability carries a CVSS v3.1 base score of 8.2 (High), with vector AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L.
An authenticated attacker with low privileges (PR:L) can exploit this vulnerability over the network (AV:N) with low complexity (AC:L), provided a targeted user interacts with malicious content (UI:R). Successful exploitation changes scope to cross-origin contexts (S:C), enabling high confidentiality impact such as theft of sensitive data, alongside low integrity and availability impacts.
Hitachi's security advisory (hitachi-sec-2026-114) details the issue, with mitigation achieved by upgrading to Hitachi Ops Center Analyzer version 11.0.5-00 or later.
Details
- CWE(s)