Seagate NAS drives can be hacked through simple Telnet hole

8 Sep 2015 | Author: | No comments yet »

Backdoor discovered in some Seagate hard drives.

A security vulnerability has been found on Seagate wireless hard drives that could hand attackers root access to the device just by entering a default username and password.

Three devices – Seagate Wireless Plus Mobile Storage, Seagate Wireless Mobile Storage, and LaCie FUEL – with firmware versions 2.2.0.005 and 2.3.0.014 are vulnerable to three attack vectors. “With products from large vendors such as Seagate, there tend to be numerous product names for basically the same product under the same vendor’s name or another vendor,” said Tangible Security. First discovered by Tangible Security, Inc. last week, the vulnerability is a strange one simply due to the absurd simplicity of it: affected devices are shipped with an undocumented Telnet service that is accessible over the internet by using the default credentials of “root” as the username and a default password. Researchers at Tangible Security have discovered a series of vulnerabilities in a number of devices produced by Seagate that could allow unauthorized access to files and settings. If that’s not bad enough the credentials are hard-coded into the device so it’s not simply a matter of owners hitting the control panel of the hard drives and switching it off to fix it.

Seagate has patched the vulnerabilities and issued a firmware update that is available to customers on Seagate.com and through a link on the CERT notification. Given access an attacker is able to covertly take control of the device, not only compromising the confidentiality of files stored on it but use it as a platform to conduct malicious operations beyond the device. The devices are, however, effectively a small network-attached storage device: there’s every chance more than a few are doing duty as a de facto file server in very small businesses.

There are also other vulnerabilities that allow for unauthorized browsing and downloading of files, as well as permitting malicious files to be uploaded. The firmware update addresses all security concerns with these vulnerabilities.” FireEye’s security product was apparently hacked by Los Angeles-based researcher Kristian Erik Hermansen, who revealed on Twitter that he had found ‘at least four’ security flaws in the company’s core product. “Why would you trust these people to have this device on your network,” said Hermansen when he disclosed the vulnerabilities on Pastebin and Exploit-DB. The three flaws present in the device mean that anyone on your network – or who can reach it from the outside – armed with the default password of “root” and enough savvy to try the username “root” can download the entire contents of the Seagate devices, then upload malware into them.

The company also requests owners of its kit to “please check the Download Finder regularly to determine if new firmware is available for your drive.” Lovely sentiments, but of course most consumers have shown they’ve no idea about this stuff by failing to install much-needed new broadband router firmware despite colossal security holes. ® This vulnerability requires attackers to be within range of the device’s wireless network Vulnerability Description: The affected device firmware provides a file upload capability to the device’s /media/sda2 file system, which is reserved for the file sharing Impact Description: this vulnerability requires attackers to be within range of the device’s wireless network, who can upload files onto it.

Here you can write a commentary on the recording "Seagate NAS drives can be hacked through simple Telnet hole".

* Required fields
Twitter-news
Our partners
Follow us
Contact us
Our contacts

dima911@gmail.com

ICQ: 423360519

About this site