Published:2013/02/21  Last Updated:2013/02/25

NEC Universal RAID Utility fails to restrict access permissions


NEC Universal RAID Utility contains an issue where access permissions are not restricted.

Products Affected

  • Universal RAID Utility Ver1.40 (for Windows) Rev 680 and earlier
  • Universal RAID Utility Ver2.31 (for Windows/Linux/VMware ESX) Rev 1492 and earlier
  • Universal RAID Utility Ver2.5 (for Windows/Linux/VMware ESX) Rev 2244 and earlier


NEC Universal RAID Utility is a software to manage a RAID controller. NEC Universal RAID Utility contains an issue where access permissions are not restricted.


A remote unauthenticated attacker may conduct arbitrary operations against the HDD on the vulunerable RAID system.


Update the software
Update to the latest version according to the information provided by the developer.

Apply a workaround
The following workaround may mitigate the affects of this vulnerability.

  • Restrict access from 52805/TCP.


JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Analyzed on 2013.02.21

Measures Conditions Severity
Access Required can be attacked over the Internet using packets
  • High
Authentication anonymous or no authentication (IP addresses do not count)
  • High
User Interaction Required the vulnerability can be exploited without an honest user taking any action
  • High
Exploit Complexity some expertise and/or luck required (most buffer overflows, guessing correctly in small space, expertise in Windows function calls)
  • Mid-High

Description of each analysis measures


SAKURA Internet Inc. reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Reports
CERT Advisory
CPNI Advisory
CVE CVE-2013-0706
JVN iPedia JVNDB-2013-000012

Update History

Information under the section "Impact" and "Solution" were modified.