FKIE_CVE-2012-3266

Vulnerability from fkie_nvd - Published: 2012-10-02 21:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
Unspecified vulnerability in IBRIX 6.1.196 through 6.1.251 on HP IBRIX X9000 Storage allows remote attackers to obtain sensitive information via unknown vectors.
Impacted products
Vendor Product Version
hp ibrix 6.1.196
hp ibrix 6.1.210
hp ibrix 6.1.228
hp ibrix 6.1.243
hp ibrix 6.1.247
hp ibrix 6.1.249
hp ibrix 6.1.251
hp ibrix_x9300 aw539d
hp ibrix_x9300 aw540d
hp ibrix_x9320 qp330b
hp ibrix_x9320 qp331b
hp ibrix_x9730 qz730a
hp ibrix_x9730 qz731a

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.196:*:*:*:*:*:*:*",
              "matchCriteriaId": "441AB864-5D3A-4C29-8773-718092CF47C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.210:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D0F5E61-3162-4664-8E71-BAEBB7056F71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.228:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB3C720-5AFE-4468-A1C8-F9416EEDCCD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.243:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F47AF90-077D-4722-8425-2BD8BD2610EF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.247:*:*:*:*:*:*:*",
              "matchCriteriaId": "084B14AB-ADBF-429F-8469-5112E7BE5045",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.249:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2CF2D7A-B3D8-40EF-A3CD-B25A97922507",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hp:ibrix:6.1.251:*:*:*:*:*:*:*",
              "matchCriteriaId": "777282FD-5DA1-49ED-A37F-FAA34A1791B3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9300:aw539d:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D03D799-1FEB-4E69-9B41-E056E466A3BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9300:aw540d:*:*:*:*:*:*:*",
              "matchCriteriaId": "D24AF953-DA3B-4A01-AC5F-D5390896A0B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9320:qp330b:*:*:*:*:*:*:*",
              "matchCriteriaId": "350C3A3F-7701-4ED1-A949-21C45C0E2DB3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9320:qp331b:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BEDC2EC-5C6E-4051-A01A-5F4B590ECE72",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9730:qz730a:*:*:*:*:*:*:*",
              "matchCriteriaId": "256C9295-184D-43FF-865C-8F955F7D59FE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:hp:ibrix_x9730:qz731a:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A366356-25DC-4460-A78E-22D73CC0139B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in IBRIX 6.1.196 through 6.1.251 on HP IBRIX X9000 Storage allows remote attackers to obtain sensitive information via unknown vectors."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en IBRIX v6.1.196 hasta v6.1.251 en HP IBRIX X9000 Storage, permite a atacantes remotos obtener informaci\u00f3n sensible a trav\u00e9s de vectores desconocidos."
    }
  ],
  "id": "CVE-2012-3266",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2012-10-02T21:55:01.270",
  "references": [
    {
      "source": "hp-security-alert@hp.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03510876"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03510876"
    }
  ],
  "sourceIdentifier": "hp-security-alert@hp.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…