Skip to main content

Zero-day in Seagate NAS allows attacker to remotely get unauthorized root access

posted onMarch 2, 2015
by l33tdawg

Thousands of Seagate Network Attached Storage (NAS) devices are defenseless against a zero-day remote code execution (RCE) vulnerability. Back in October, security researcher OJ Reeves attempted to responsibly disclose the hole in Seagate’s Business Storage 2-Bay NAS products, which ironically use a tagline of “deadlines happen. Be ready.” But Seagate still hasn’t issued a firmware fix, so Reeves has now publicly disclosed the bug.

“Products in this line that run firmware versions up to and including version 2014.00319 were found to be vulnerable to a number of issues that allow for remote code execution under the context of the root user,” Reeves wrote on Beyond Binary. “These vulnerabilities are exploitable without requiring any form of authorization on the device.” Reeves believes all previous firmware versions “are highly likely to contain the same vulnerabilities.”

“It’s basically a ‘push button, receive bacon’ situation,” Reeves told iDigitalTimes. By using Shodan, he found over 2,500 publicly exposed and vulnerable boxes on the web waiting to be popped.

Source

Tags

Security

You May Also Like

Recent News

Friday, November 29th

Tuesday, November 19th

Friday, November 8th

Friday, November 1st

Tuesday, July 9th

Wednesday, July 3rd

Friday, June 28th

Thursday, June 27th

Thursday, June 13th

Wednesday, June 12th

Tuesday, June 11th