CVE-2012-2283
Published Aug 16, 2012
Last updated 5 years ago
Overview
- Description
- The Iomega Home Media Network Hard Drive with EMC Lifeline firmware before 2.104, Home Media Network Hard Drive Cloud Edition with EMC Lifeline firmware before 3.2.3.15290, iConnect with EMC Lifeline firmware before 2.5.26.18966, and StorCenter with EMC Lifeline firmware before 2.0.18.23122, 2.1.x before 2.1.42.18967, and 3.x before 3.2.3.15290 allow remote authenticated users to read or modify data on arbitrary remote shares via unspecified vectors.
- Source
- security_alert@emc.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5.5
- Impact score
- 4.9
- Exploitability score
- 8
- Vector string
- AV:N/AC:L/Au:S/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D15202C4-42F7-4B6A-83E7-C0A5074A785C", "versionEndIncluding": "2.103" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:iomega:home_media_network_hard_drive:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8DE278A-CF34-4F93-82EB-F93D4588C853" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "77F0E1E9-BF34-447D-B82F-908AC24E6F62", "versionEndIncluding": "3.2.3.15289" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:iomega:home_media_network_hard_drive:*:*:cloud:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B8B4002C-5FD8-465A-9EAF-B1F465489A50" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE71E576-A598-4A3C-AE5B-7177BAA99836", "versionEndIncluding": "2.5.26.18965" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:iomega:iconnect:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56F019A7-FC61-457A-9529-8EB0F19A628A" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D317851D-F8F7-4BA6-9DF7-615CAFCB03A8", "versionEndIncluding": "2.0.18.23121" }, { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1A1432D7-0104-43D1-AD70-A763E8581388", "versionEndIncluding": "2.1.42.18966", "versionStartIncluding": "2.1.0" }, { "criteria": "cpe:2.3:o:emc:lifeline:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3F9D555-0EB6-4258-A870-B185584747F9", "versionEndExcluding": "3.2.3.15290", "versionStartIncluding": "3.0" }, { "criteria": "cpe:2.3:o:emc:lifeline:23.2.3.15289:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B40B15A9-8785-404D-B84D-6C765C3BAB3F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:iomega:storcenter:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6F71D872-4B50-49D1-A6CC-38868DB58F1E" } ], "operator": "OR" } ], "operator": "AND" } ]