First published: Tue Jan 21 2014(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in the Seagate BlackArmor NAS 220 devices with firmware sg2000-2000.1331 allow remote attackers to hijack the authentication of administrators for requests that (1) add user accounts via a crafted request to admin/access_control_user_add.php; (2) modify or (3) delete user accounts; (4) perform a factory reset; (5) perform a device reboot; or (6) add, (7) modify, or (8) delete shares and volumes.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seagate BlackArmor NAS 220 | =sg2000-2000.1331 | |
Seagate BlackArmor NAS | =st320005lsa10g-rk | |
Seagate BlackArmor NAS | =st340005lsa10g-rk | |
Seagate BlackArmor NAS | =stav6000100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6922 is classified as a high severity vulnerability due to its potential to allow unauthorized access to administrative functions.
To fix CVE-2013-6922, it is crucial to update the firmware of the Seagate BlackArmor NAS 220 devices to a version that does not have this vulnerability.
CVE-2013-6922 affects Seagate BlackArmor NAS 220 devices specifically with firmware version sg2000-2000.1331.
CVE-2013-6922 is a Cross-Site Request Forgery (CSRF) vulnerability that can lead to unauthorized actions performed on behalf of an authenticated user.
Yes, CVE-2013-6922 can allow remote attackers to hijack administrator sessions and perform unauthorized actions.