Zero-day in Seagate NAS allows attacker to remotely get unauthorized root access
Thousands of Seagate Network Attached Storage (NAS) devices are defenseless against a zero-day remote code execution (RCE) vulnerability. Back in October, security researcher OJ Reeves attempted to responsibly disclose the hole in Seagate’s Business Storage 2-Bay NAS products, which ironically use a tagline of “deadlines happen. Be ready.” But Seagate still hasn’t issued a firmware fix, so Reeves has now publicly disclosed the bug.
“Products in this line that run firmware versions up to and including version 2014.00319 were found to be vulnerable to a number of issues that allow for remote code execution under the context of the root user,” Reeves wrote on Beyond Binary. “These vulnerabilities are exploitable without requiring any form of authorization on the device.” Reeves believes all previous firmware versions “are highly likely to contain the same vulnerabilities.”
“It’s basically a ‘push button, receive bacon’ situation,” Reeves told iDigitalTimes. By using Shodan, he found over 2,500 publicly exposed and vulnerable boxes on the web waiting to be popped.