Seagate Business NAS devices with firmware before 2015.00322 allow remote attackers to execute arbitrary code with root privileges by leveraging use of a static encryption key to create session tokens.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 02:19
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/130585/Seagate-Business-NAS-2014.00319-Remote-Code-Execution.html - Exploit, Third Party Advisory | |
References | () http://packetstormsecurity.com/files/130609/Seagate-Business-NAS-Unauthenticated-Remote-Command-Execution.html - Exploit, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/72831 - Third Party Advisory, VDB Entry | |
References | () https://beyondbinary.io/articles/seagate-nas-rce/ - Third Party Advisory | |
References | () https://www.exploit-db.com/exploits/36202/ - Exploit, Third Party Advisory, VDB Entry | |
References | () https://www.exploit-db.com/exploits/36264/ - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2017-06-08 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2014-8687
Mitre link : CVE-2014-8687
CVE.ORG link : CVE-2014-8687
JSON object : View
Products Affected
seagate
- business_nas
- business_nas_firmware
CWE
CWE-327
Use of a Broken or Risky Cryptographic Algorithm