CVE-2014-8687

Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:seagate:business_nas_firmware:2014.00319:*:*:*:*:*:*:*
cpe:2.3:h:seagate:business_nas:-:*:*:*:*:*:*:*

History

21 Nov 2024, 02:19

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html - Exploit, Third Party Advisory
References () http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html - Exploit, Third Party Advisory () http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html - Exploit, Third Party Advisory
References () http://www.securityfocus.com/bid/72831 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/72831 - Third Party Advisory, VDB Entry
References () https://beyondbinary.io/articles/seagate-nas-rce/ - Third Party Advisory () https://beyondbinary.io/articles/seagate-nas-rce/ - Third Party Advisory
References () https://www.exploit-db.com/exploits/36202/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/36202/ - Exploit, Third Party Advisory, VDB Entry
References () https://www.exploit-db.com/exploits/36264/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/36264/ - Exploit, Third Party Advisory, VDB Entry

Information

Published : 2017-06-08 16:29

Updated : 2025-04-20 01:37


NVD link : CVE-2014-8687

Mitre link : CVE-2014-8687

CVE.ORG link : CVE-2014-8687


JSON object : View

Products Affected

seagate

  • business_nas
  • business_nas_firmware
CWE
CWE-327

Use of a Broken or Risky Cryptographic Algorithm