First published: Tue Dec 06 2022(Updated: )
The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
Credit: Ege Balci cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Seagate Stcg2000300 Firmware | ||
Seagate Stcg2000300 | ||
Seagate Stcg3000300 Firmware | ||
Seagate Stcg3000300 | ||
Seagate Stcg4000300 Firmware | ||
Seagate Stcg4000300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6627 has been classified as a critical vulnerability due to its potential for OS command injection.
To fix CVE-2020-6627, update the firmware of your Seagate Central NAS to the latest version provided by Seagate.
CVE-2020-6627 affects Seagate Central NAS models STCG2000300, STCG3000300, and STCG4000300.
OS command injection in CVE-2020-6627 allows an attacker to execute arbitrary operating system commands on the vulnerable device.
If exploited, CVE-2020-6627 could lead to unauthorized access and control over the affected Seagate NAS device.