Seagate's HDD proved to be at risk of stealing data via hidden route account



Some products sold by HDD major manufacturer Seagate have a Telnet function, which is vulnerable to stealing data inside the HDD unlimited or uploading malicious files by hiding it with a hidden root account And security research institution'sCERTPointed out.

Vulnerability Note VU # 903500 - Seagate and LaCie wireless storage products contain multiple vulnerabilities
http://www.kb.cert.org/vuls/id/903500

Seagate drives at risk of data theft over hidden 'root' account | ZDNet
http://www.zdnet.com/article/seagate-hard-drives-open-to-hackers-thanks-to-hard-coded-password/

The vulnerability is pointed out as "Seagate sells"Wireless Plus Mobile Storage"Wireless Mobile Storage"LaCie Fuel hard drive"Hard disk products that can transmit and receive data wirelessly, such as.


These HDDs have a Telnet service, and there is a root account whose user name and password are set to "root" by default. By exploiting Telnet using this root account, CERT points out that access to HDD data can be accessed from the outside. Incidentally, as damage predicted by hacking, downloading files to be saved, uploading malicious files to the file sharing folder, etc. are mentioned.

Security researcher Kenny White said "Seagate should cease preparing hidden root accounts on HDD," commenting Seagate's product design criticism.

According to CERT, the vulnerability to use the root account is the product whose firmware version sold around October 2014 is "2.2.0.005" "2.3.0.014", the vulnerability is corrected with the latest firmware Although it turned out to be possible, there are no announcements about vulnerabilities from Seagate, and at this time there is no answer for individual questions.

in Note,   Hardware, Posted by darkhorse_log