Hard-coded login leaves Seagate wireless hard drives wide open

Nice Seagate wireless hard drive you have there. Shame if anybody on your network had full access to it. Unfortunately, that's exactly what can happen, thanks to vulnerabilities found in some models of the company's external hard drives. A CERT report details the problem, which affects Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and Seagate-powered LaCie Fuel drives.

First and foremost, these drives have "undocumented Telnet services" enabled by default, which can be accessed with the "root" username and a default password. That's enough for anyone on the same network as the drives to gain what is likely system-level access. Attackers could siphon off any or all of the data on the drives, and perhaps plant some neat booby traps or files of their own.

The problems don't end there, though. The drives in question don't fully validate user authorization when browsing files, granting "unrestricted file download capability" to anonymous users on the network. There's an upload vulnerability, as well: with the default configuration, attackers can upload anything they wish to the drives' file sharing partition.

The report indicates that firmware versions and on the above drives are affected, and it doesn't exclude the possibility that other versions may also be vulnerable.

Tip: You can use the A/Z keys to walk threads.
View options

This discussion is now closed.