First published: Thu Dec 31 2015(Updated: )
Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, Seagate Wireless Plus Mobile Storage, and LaCie FUEL devices with firmware before 3.4.1.105 have a default password of root for the root account, which allows remote attackers to obtain administrative access via a TELNET session.
Credit: cret@cert.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seagate Wireless Plus Mobile Storage | ||
Seagate Wireless Mobile Storage | ||
Lacie Lac9000436u Firmware | ||
Lacie Lac9000464u Firmware | ||
LaCie LaC9000436U | <=2.3.0.014 | |
Lacie Lac9000464u | <=2.3.0.014 | |
Seagate GoFlex Satellite |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-2874 is considered a high severity vulnerability due to the presence of a default password for the root account, allowing unauthorized access.
To mitigate CVE-2015-2874, update the firmware of affected devices to version 3.4.1.105 or later, which removes the default password.
CVE-2015-2874 affects Seagate GoFlex Satellite, Seagate Wireless Mobile Storage, and Seagate Wireless Plus Mobile Storage devices with firmware prior to 3.4.1.105.
Yes, CVE-2015-2874 can be exploited remotely by attackers through a TELNET session due to the default root password.
The primary workaround for CVE-2015-2874 is to change the default root password on affected devices, though updating the firmware is recommended for complete security.