Vulnerability Note VU#515283

Seagate BlackArmor device static administrator password reset vulnerability

Original Release date: 23 May 2012 | Last revised: 18 Jul 2012

Overview

The Seagate BlackArmor network attached storage device contains a static administrator password reset vulnerability.

Description

The Seagate BlackArmor network attached storage device contain a static php file used to reset the administrator password. A remote unauthenticated attacker with access to the device's management web server can directly access the webpage, http://DevicesIpAddress/d41d8cd98f00b204e9800998ecf8427e.php and reset the administrator password.

Impact

A remote unauthenticated attacker may be able to reset the administrator password of the device.

Solution

Update

The vendor has stated that updated firmware has been released that addresses this vulnerability. Updated firmware for 1, 2 and 4-bay Seagate BlackArmor devices can be found under the "Downloads" tab on vendor's support website.

The firmware versions that are reported to address this vulnerability are:
BlackArmorNAS 110: 1000.1301
BlackArmorNAS 220: 2000.1311
BlackArmorNAS 440: 4000.1391

Restrict network access

Restrict network access to the Seagate BlackArmor network attached storage devices system web interface and other devices using open protocols like HTTP.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Seagate Technology LLCAffected07 Mar 201217 Jul 2012
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base 7.5 AV:N/AC:L/Au:N/C:P/I:P/A:P
Temporal 5.8 E:POC/RL:W/RC:UC
Environmental 1.6 CDP:L/TD:L/CR:ND/IR:ND/AR:ND

References

Credit

Thanks to Jason Ellison for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: CVE-2012-2568
  • Date Public: 23 May 2012
  • Date First Published: 23 May 2012
  • Date Last Updated: 18 Jul 2012
  • Document Revision: 29

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.