Lucene search

K
certCERTVU:515283
HistoryMay 23, 2012 - 12:00 a.m.

Seagate BlackArmor device static administrator password reset vulnerability

2012-05-2300:00:00
www.kb.cert.org
205

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.2%

Overview

The Seagate BlackArmor network attached storage device contains a static administrator password reset vulnerability.

Description

The Seagate BlackArmor network attached storage device contain a static php file used to reset the administrator password. A remote unauthenticated attacker with access to the device’s management web server can directly access the webpage, <http://DevicesIpAddress/d41d8cd98f00b204e9800998ecf8427e.php> and reset the administrator password.


Impact

A remote unauthenticated attacker may be able to reset the administrator password of the device.


Solution

Update

The vendor has stated that updated firmware has been released that addresses this vulnerability. Updated firmware for 1, 2 and 4-bay Seagate BlackArmor devices can be found under the “Downloads” tab on vendor’s support website.

The firmware versions that are reported to address this vulnerability are:
BlackArmorNAS 110: 1000.1301
BlackArmorNAS 220: 2000.1311
BlackArmorNAS 440: 4000.1391


Restrict network access

Restrict network access to the Seagate BlackArmor network attached storage devices system web interface and other devices using open protocols like HTTP.


Vendor Information

515283

Filter by status: All Affected Not Affected Unknown

Filter by content: __ Additional information available

__ Sort by: Status Alphabetical

Expand all

Javascript is disabled. Click here to view vendors.

Seagate Technology LLC __ Affected

Notified: March 07, 2012 Updated: July 17, 2012

Statement Date: June 26, 2012

Status

Affected

Vendor Statement

We have not received a statement from the vendor.

Vendor Information

Vendor release notes:

4000.1391:
Release Date: June 12th, 2012
File size: 36 MB

Feature Enhancement:
Complete overhaul of the Seagate Global Access service offering that includes:

Vendor References

CVSS Metrics

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.8 E:POC/RL:W/RC:UC
Environmental 1.6 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Acknowledgements

Thanks to Jason Ellison for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

CVE IDs: CVE-2012-2568
Date Public: 2012-05-23 Date First Published:

10 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.008 Low

EPSS

Percentile

81.2%

Related for VU:515283