Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
The product uses a broken or risky cryptographic algorithm or protocol.
Link | Tags |
---|---|
https://beyondbinary.io/articles/seagate-nas-rce/ | third party advisory |
http://www.securityfocus.com/bid/72831 | vdb entry third party advisory |
http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html | third party advisory exploit |
http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html | third party advisory exploit |
https://www.exploit-db.com/exploits/36202/ | exploit vdb entry third party advisory |
https://www.exploit-db.com/exploits/36264/ | exploit vdb entry third party advisory |