Your Seagate wireless hard-drive may get hacked !

Many  Seagate  wireless hard-drives are prone to various critical vulnerabilities.

Seagate devices allow use of undocumented Telnet services by using the default credentials of ‘root’ as username and the default password (CVE-2015-2874).

In addition to this, under a default configuration, Seagate wireless hard-drives provide an unrestricted file download capability to anonymous attackers with wireless access to the device. This allows an attacker to directly download files from anywhere on the filesystem (CVE-2015-2875).

Seagate wireless hard-drives also allow anonymous attackers to upload files with wireless access to the device’s /media/sda2 filesystem. This filesystem is reserved for the file-sharing. Due to insufficient restrictions in place an attacker might upload scripts or executables to completely compromise the device (CVE-2015-2876).

A remote unauthenticated attacker may access/upload arbitrary files on the affected Seagate harddrive or gain root access to the device.

To address these issues, Seagate has released firmware 3.4.1.105 in all affected devices. Affected users are encouraged to update the latest firmware into their affected devices to avoid any further damage.

Related posts

Leave a Comment