Jump to content

Seagate patches Wireless hard drive backdoor


Chicog

Recommended Posts

Seagate issued patches for vulnerabilities in its wireless hard drives and is advising users to update the embedded firmware in the drives to fix the flaws.

Although wireless hard drives provide a convenient, untethered way to back up data, it's still critically important to keep the firmware on the wireless drives up-to-date. Seagate is advising users of its Wireless Mobile Storage and LaCie FUEL hard drives to update the embedded firmware to patch for multiple known vulnerabilities that could potentially enable a remote attacker to gain unauthorized access to a user's information.

In new firmware updates, Seagate is patching for three vulnerabilities (CVE-2015-2874, CVE-2015-2875 and CVE-2015-2876). Researchers from Tangible Security reported the vulnerabilities on March 28 to Seagate, which patched them on Sept. 1. According to Tangible Security, the flaws have been present in Seagate's devices since October 2014.

Among the flaws that Seagate is patching is a hard-coded administrative credentials issue (CVE-2015-2874). The hard-coded credentials included a default administrative account with the username and password of "root." To add further insult to injury, the hard-coded credentials were included in an undocumented component of the Seagate firmware that enabled Telnet services. Security experts widely regard Telnet as an insecure protocol that should not be used because it doesn't encrypt data.

Tangible Security warned that the impact of the CVE-2015-2874 vulnerability is that an attacker could take control of a user's hard drive and also potentially use the device as a base from which to launch other attacks.

Another patched issue (CVE-2015-2875) is a direct-request, forced-browsing flaw.

"Under a default configuration, Seagate wireless hard drives provide an unrestricted file download capability to anonymous attackers with wireless access to the device," CERT warns in a vulnerability note.

The third issue that Seagate is patching, CVE-2015-2876, is an "unrestricted upload of file with dangerous type" flaw. The issue is that the unpatched firmeware allows access to a section of the hard drive that is intended to be used for file-sharing.

http://www.eweek.com/security/seagate-patches-for-3-backdoor-security-vulnerabilities.html

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.







×
×
  • Create New...