First published: Wed Dec 26 2012(Updated: )
Directory traversal vulnerability in the Web UI in EMC Data Protection Advisor (DPA) 5.6 through SP1, 5.7 through SP1, and 5.8 through SP4 allows remote attackers to read arbitrary files via unspecified vectors.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Dell EMC Data Protection Advisor | =5.6 | |
Dell EMC Data Protection Advisor | =5.6-sp1 | |
Dell EMC Data Protection Advisor | =5.7 | |
Dell EMC Data Protection Advisor | =5.7-sp1 | |
Dell EMC Data Protection Advisor | =5.8 | |
Dell EMC Data Protection Advisor | =5.8-sp1 | |
Dell EMC Data Protection Advisor | =5.8-sp4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4616 has a medium severity rating as it allows remote attackers to read arbitrary files.
To fix CVE-2012-4616, you should upgrade to a patched version of EMC Data Protection Advisor beyond 5.8 SP4.
CVE-2012-4616 affects EMC Data Protection Advisor versions 5.6 to 5.8 SP4.
CVE-2012-4616 is classified as a directory traversal vulnerability.
Yes, CVE-2012-4616 can be exploited remotely by attackers to access restricted files.