1. Welcome Guest! In order to create a new topic or reply to an existing one, you must register first. It is easy and free. Click here to sign up now!.
    Dismiss Notice

Seagate drives at risk of data theft over hidden 'root' account

Discussion in 'Security Updates' started by starbuck, Sep 7, 2015.

  1. starbuck

    starbuck Rest In Peace Pete Administrator

    Joined:
    Sep 26, 2009
    Messages:
    3,830
    Location:
    Midlands, UK
    Operating System:
    Windows 10
    CPU:
    AMD Athlon II x2 250 Processor 3.00GHz
    Memory:
    8gb DDR3
    Hard Drive:
    500gb SATA
    Graphics Card:
    ASUS GeForce GTX 960 2gb
    Power Supply:
    650w PowerCool X-Viper
    A public vulnerability disclosure warns that an attacker could remotely download files from an affected hard drive, thanks to the hard-coded default password.

    A number of Seagate hard drives are vulnerable to data theft, thanks to an undocumented, in-built user account that could give an attacker remote access to the device.

    "Seagate wireless hard-drives provides undocumented Telnet services accessible by using the default credentials of 'root' as username and the default password," said a public advisory posted Tuesday.

    The vulnerability is just one of many flaws in three wireless hard drives manufactured by the company, the advisory said.

    Other flaws included in the advisory allow an attacker to "directly download files from anywhere on the file system."

    Seagate Wireless Plus Mobile Storage, Seagate Wireless Mobile Storage, and the company's LaCie Fuel hard drives are said to be affected by the flaw.

    The flaws, discovered by researchers at security firm Tangible Security, are said to date back as early as October 2014, affecting firmware versions 2.2.0.005 and 2.3.0.014.

    The flaws are fixable if affected devices are updated to the latest firmware. But the hard drive manufacturer didn't escape a jab from respected security researcher Kenn White, who criticized the company in a tweet on Sunday.

    "People don't expect DOD-level security but, Seagate, please stop adding hidden hardcoded root logins to hard drives," White wrote.

    Seagate did not respond to comment at the time of writing.


    Source:
    http://www.zdnet.com/article/seagat...hanks-to-hard-coded-password/#ftag=RSSbaffb68
     
    IceMan37 likes this.
  2. IceMan37

    IceMan37 Banned

    Joined:
    Apr 24, 2014
    Messages:
    1,079
    Operating System:
    Windows 10
    Computer Brand or Motherboard:
    MSI Z87M-G43
    CPU:
    I5 4690k @ 4.6
    Memory:
    16GB Hyper X 1866
    Hard Drive:
    1TB WD_Blue | 240Gb Sandosk SSD
    Graphics Card:
    eVGA GTX 970 FTW
    Power Supply:
    750W Tt
    Good to know thanks for posting this.
     

Share This Page