ID

VAR-201208-0535


CVE

CVE-2012-2283


TITLE

plural Iomega Product EMC Lifeline Vulnerability to read data in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2012-003719

DESCRIPTION

The Iomega Home Media Network Hard Drive with EMC Lifeline firmware before 2.104, Home Media Network Hard Drive Cloud Edition with EMC Lifeline firmware before 3.2.3.15290, iConnect with EMC Lifeline firmware before 2.5.26.18966, and StorCenter with EMC Lifeline firmware before 2.0.18.23122, 2.1.x before 2.1.42.18967, and 3.x before 3.2.3.15290 allow remote authenticated users to read or modify data on arbitrary remote shares via unspecified vectors. Iomega network storage devices is a family of network storage devices. If remote access (including port forwarding) is enabled for the affected device, all created shares (including those linked to the USB device) can be accessed by remote unauthorized users due to access control issues. The following devices are vulnerable: Home Media Network Hard Drive iConnect StorCenter. ---------------------------------------------------------------------- The new Secunia CSI 6.0 is now available in beta! Seamless integration with your existing security solutions Sign-up to become a Beta tester: http://secunia.com/csi6beta ---------------------------------------------------------------------- TITLE: EMC Lifeline Shares Access Security Bypass Security Issue SECUNIA ADVISORY ID: SA50232 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/50232/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=50232 RELEASE DATE: 2012-08-09 DISCUSS ADVISORY: http://secunia.com/advisories/50232/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/50232/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=50232 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: A security issue has been reported in EMC Lifeline, which can be exploited by malicious people to bypass certain security restrictions. Please see the vendor's advisory for a list of affected versions. SOLUTION: Update to a fixed version (please see the vendor's advisory for details). PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ORIGINAL ADVISORY: ESA-2012-031: http://archives.neohapsis.com/archives/bugtraq/2012-08/att-0056/ESA-2012-031.txt OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ---------------------------------------------------------------------- . Problem Resolution: Download and install updated firmware for the Iomega network storage device. Link to remedies: Firmware updates for each affected Iomega product are available for download from www.iomega.com/support. Refer to the Readme.txt file included with the firmware update for additional information. Follow guidelines provided on the Iomega support site for security best practices; locate these articles by searching for "security best practices" from the support page for the specified Iomega network storage products. Because the view is restricted based on customer agreements, you may not have permission to view certain downloads. Should you not see a software download you believe you should have access to, follow the instructions in EMC Knowledgebase solution emc116045. For an explanation of Severity Ratings, refer to EMC Knowledgebase solution emc218831. EMC recommends all customers take into account both the base score and any relevant temporal and environmental scores which may impact the potential severity associated with particular security vulnerability. EMC Corporation distributes EMC Security Advisories, in order to bring to the attention of users of the affected EMC products, important security information. EMC recommends that all users determine the applicability of this information to their individual situations and take appropriate action. The information set forth herein is provided "as is" without warranty of any kind. EMC disclaims all warranties, either express or implied, including the warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event, shall EMC or its suppliers, be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if EMC or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages, so the foregoing limitation may not apply. EMC Product Security Response Center Security_Alert@EMC.COM http://www.emc.com/contact-us/contact/product-security-response-center.html -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (Cygwin) iEYEARECAAYFAlAido0ACgkQtjd2rKp+ALwozgCfXlDVBnED5t8BprcB+xwU0qNM pdUAoM9XsEtioHIqHnVrYEx+64e2tP3k =JiIt -----END PGP SIGNATURE-----

Trust: 2.61

sources: NVD: CVE-2012-2283 // JVNDB: JVNDB-2012-003719 // CNVD: CNVD-2012-4175 // BID: 54898 // PACKETSTORM: 115397 // PACKETSTORM: 115382

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2012-4175

AFFECTED PRODUCTS

vendor:emcmodel:lifelinescope:eqversion:23.2.3.15289

Trust: 1.6

vendor:emcmodel:lifelinescope:lteversion:2.0.18.23121

Trust: 1.0

vendor:emcmodel:lifelinescope:gteversion:3.0

Trust: 1.0

vendor:iomegamodel:storcenterscope:eqversion:*

Trust: 1.0

vendor:iomegamodel:home media network hard drivescope:eqversion:*

Trust: 1.0

vendor:iomegamodel:iconnectscope:eqversion:*

Trust: 1.0

vendor:emcmodel:lifelinescope:ltversion:3.2.3.15290

Trust: 1.0

vendor:emcmodel:lifelinescope:lteversion:2.5.26.18965

Trust: 1.0

vendor:emcmodel:lifelinescope:lteversion:3.2.3.15289

Trust: 1.0

vendor:emcmodel:lifelinescope:gteversion:2.1.0

Trust: 1.0

vendor:emcmodel:lifelinescope:lteversion:2.1.42.18966

Trust: 1.0

vendor:emcmodel:lifelinescope:lteversion:2.103

Trust: 1.0

vendor:iomegamodel:home media network hard drivescope:eqversion:(emc lifeline firmware 2.104

Trust: 0.8

vendor:iomegamodel:storcenterscope:ltversion:2.1.x)

Trust: 0.8

vendor:iomegamodel:storcenterscope:ltversion:3.x)

Trust: 0.8

vendor:iomegamodel:storcenterscope:eqversion:(emc lifeline firmware 2.0.18.23122

Trust: 0.8

vendor:iomegamodel:storcenterscope:eqversion:(emc lifeline firmware 2.1.42.18967

Trust: 0.8

vendor:iomegamodel:iconnectscope:ltversion:)

Trust: 0.8

vendor:iomegamodel:iconnectscope:eqversion:(emc lifeline firmware 2.5.26.18966

Trust: 0.8

vendor:iomegamodel:storcenterscope:eqversion:(emc lifeline firmware 3.2.3.15290

Trust: 0.8

vendor:iomegamodel:home media network hard drivescope:eqversion:cloud edition (emc lifeline firmware 3.2.3.15290

Trust: 0.8

vendor:iomegamodel:storcenterscope:ltversion:)

Trust: 0.8

vendor:iomegamodel:home media network hard drivescope:ltversion:)

Trust: 0.8

vendor:iomegamodel:home media network hard drivescope:eqversion:2.064

Trust: 0.6

vendor:iomegamodel:home media network hard drive cloud editionscope:eqversion:3.1.14.995

Trust: 0.6

vendor:iomegamodel:iconnectscope:eqversion:2.5.24.10916

Trust: 0.6

vendor:iomegamodel:storcenter ix2scope:eqversion:2.0.15.43099

Trust: 0.6

vendor:iomegamodel:storcenter ix2-200scope:eqversion:2.1.40.8151

Trust: 0.6

vendor:iomegamodel:storcenter ix2-200 cloud editionscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter ix4-100scope:eqversion:2.0.15.4309

Trust: 0.6

vendor:iomegamodel:storcenter ix4-200dscope:eqversion:2.1.40.8151

Trust: 0.6

vendor:iomegamodel:storcenter ix4-200d cloud editionscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter ix4-200r orscope:eqversion:2.1.40.81512.0.15.43099

Trust: 0.6

vendor:iomegamodel:storcenter ix12-300rscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter px4-300dscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter px4-300rscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter px6-300dscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:iomegamodel:storcenter px12-350rscope:eqversion:3.2.3.9273

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:2.1.42.18966

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:2.104

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:2.0.18.23121

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:2.5.26.18965

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:3.2.3.15289

Trust: 0.6

vendor:emcmodel:lifelinescope:eqversion:2.103

Trust: 0.6

sources: CNVD: CNVD-2012-4175 // JVNDB: JVNDB-2012-003719 // CNNVD: CNNVD-201208-101 // NVD: CVE-2012-2283

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-2283
value: MEDIUM

Trust: 1.0

NVD: CVE-2012-2283
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201208-101
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2012-2283
severity: MEDIUM
baseScore: 5.5
vectorString: AV:N/AC:L/AU:S/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

sources: JVNDB: JVNDB-2012-003719 // CNNVD: CNNVD-201208-101 // NVD: CVE-2012-2283

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-2283

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 115382 // CNNVD: CNNVD-201208-101

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201208-101

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-003719

PATCH

title:Top Pageurl:http://www.emc.com

Trust: 0.8

title:Top Pageurl:http://iomega.com

Trust: 0.8

title:Iomega Network Storage Device Security Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/19644

Trust: 0.6

sources: CNVD: CNVD-2012-4175 // JVNDB: JVNDB-2012-003719

EXTERNAL IDS

db:NVDid:CVE-2012-2283

Trust: 3.4

db:BIDid:54898

Trust: 0.9

db:JVNDBid:JVNDB-2012-003719

Trust: 0.8

db:SECUNIAid:50232

Trust: 0.7

db:CNVDid:CNVD-2012-4175

Trust: 0.6

db:BUGTRAQid:20120808 ESA-2012-031: IOMEGA STORCENTER/EMC LIFELINE REMOTE ACCESS VULNERABILITY

Trust: 0.6

db:CNNVDid:CNNVD-201208-101

Trust: 0.6

db:PACKETSTORMid:115397

Trust: 0.1

db:PACKETSTORMid:115382

Trust: 0.1

sources: CNVD: CNVD-2012-4175 // BID: 54898 // JVNDB: JVNDB-2012-003719 // PACKETSTORM: 115397 // PACKETSTORM: 115382 // CNNVD: CNNVD-201208-101 // NVD: CVE-2012-2283

REFERENCES

url:http://archives.neohapsis.com/archives/bugtraq/2012-08/0056.html

Trust: 1.6

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2012-2283

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2012-2283

Trust: 0.8

url:http://seclists.org/bugtraq/2012/aug/att-55/esa-2012-031.txt

Trust: 0.6

url:http://secunia.com/advisories/50232

Trust: 0.6

url:http://www.securityfocus.com/bid/54898

Trust: 0.6

url:http://www.iomega.com/global_landing.html

Trust: 0.3

url:/archive/1/523823

Trust: 0.3

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=50232

Trust: 0.1

url:http://secunia.com/advisories/50232/#comments

Trust: 0.1

url:http://secunia.com/advisories/50232/

Trust: 0.1

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.1

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.1

url:http://secunia.com/csi6beta

Trust: 0.1

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.1

url:http://archives.neohapsis.com/archives/bugtraq/2012-08/att-0056/esa-2012-031.txt

Trust: 0.1

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.1

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.1

url:https://www.iomega.com/support.

Trust: 0.1

url:http://www.emc.com/contact-us/contact/product-security-response-center.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2012-2283

Trust: 0.1

sources: CNVD: CNVD-2012-4175 // BID: 54898 // JVNDB: JVNDB-2012-003719 // PACKETSTORM: 115397 // PACKETSTORM: 115382 // CNNVD: CNNVD-201208-101 // NVD: CVE-2012-2283

CREDITS

EMC Product Security Response Center

Trust: 0.9

sources: BID: 54898 // CNNVD: CNNVD-201208-101

SOURCES

db:CNVDid:CNVD-2012-4175
db:BIDid:54898
db:JVNDBid:JVNDB-2012-003719
db:PACKETSTORMid:115397
db:PACKETSTORMid:115382
db:CNNVDid:CNNVD-201208-101
db:NVDid:CVE-2012-2283

LAST UPDATE DATE

2025-04-11T23:14:49.322000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2012-4175date:2012-08-10T00:00:00
db:BIDid:54898date:2012-08-08T00:00:00
db:JVNDBid:JVNDB-2012-003719date:2012-08-20T00:00:00
db:CNNVDid:CNNVD-201208-101date:2012-08-10T00:00:00
db:NVDid:CVE-2012-2283date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2012-4175date:2012-08-10T00:00:00
db:BIDid:54898date:2012-08-08T00:00:00
db:JVNDBid:JVNDB-2012-003719date:2012-08-20T00:00:00
db:PACKETSTORMid:115397date:2012-08-09T03:02:50
db:PACKETSTORMid:115382date:2012-08-09T02:41:40
db:CNNVDid:CNNVD-201208-101date:2012-08-10T00:00:00
db:NVDid:CVE-2012-2283date:2012-08-16T10:38:03.953