First published: Thu Aug 16 2012(Updated: )
The Iomega Home Media Network Hard Drive with EMC Lifeline firmware before 2.104, Home Media Network Hard Drive Cloud Edition with EMC Lifeline firmware before 3.2.3.15290, iConnect with EMC Lifeline firmware before 2.5.26.18966, and StorCenter with EMC Lifeline firmware before 2.0.18.23122, 2.1.x before 2.1.42.18967, and 3.x before 3.2.3.15290 allow remote authenticated users to read or modify data on arbitrary remote shares via unspecified vectors.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Lifeline | <=2.103 | |
Iomega Home Media Network Hard Drive | ||
EMC Lifeline | <=3.2.3.15289 | |
Iomega Home Media Network Hard Drive | ||
EMC Lifeline | <=2.5.26.18965 | |
Iomega Iconnect | ||
EMC Lifeline | <=2.0.18.23121 | |
EMC Lifeline | >=2.1.0<=2.1.42.18966 | |
EMC Lifeline | >=3.0<3.2.3.15290 | |
EMC Lifeline | =23.2.3.15289 | |
Iomega StorCenter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-2283 is classified as a medium severity vulnerability, allowing potential unauthorized access to sensitive data.
To fix CVE-2012-2283, update to the latest EMC Lifeline firmware version above the specified affected versions.
CVE-2012-2283 affects various Iomega Home Media Network Hard Drives and the EMC Lifeline firmware versions noted.
Yes, CVE-2012-2283 can be exploited remotely, which poses a risk for exposed devices on the internet.
Not fixing CVE-2012-2283 can lead to data breaches and unauthorized access to personal files stored on affected devices.