Published:2025/08/14 Last Updated:2025/08/14
JVN#89385114
Seagate Toolkit registers a Windows service with an unquoted file path
Overview
Toolkit provided by Seagate Technology registers a Windows service with an unquoted file path.
Products Affected
- Toolkit versions prior to 2.34
Description
Seagate Toolkit provided by Seagate Technology contains the following vulnerability.
- Unquoted search path or element (CWE-428)
- CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N Base Score 8.4
- CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H Base Score 6.7
Impact
A user with the write permission on the root directory of the system drive may execute arbitrary code with SYSTEM
privilege.
Solution
Update the Software
Update the software to the latest version according to the information provided by the developer.
Vendor Status
Vendor | Link |
Seagate Technology | Product Security (CWE-428) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Credit
Kazuma Matsumoto of GMO Cybersecurity by IERAE, Inc. reported this vulnerability to the developer and IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
|
JVN iPedia |
JVNDB-2025-000059 |