← Zuruck zu CVEs
CVE-2020-6627
CRITICAL9.8
Beschreibung
The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request.
CVE Details
CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht12/6/2022
Zuletzt geandert4/23/2025
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
seagate:stcg2000300seagate:stcg2000300_firmwareseagate:stcg3000300seagate:stcg3000300_firmwareseagate:stcg4000300seagate:stcg4000300_firmware
Schwachen (CWE)
CWE-78CWE-78
Referenzen
http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html(cve@mitre.org)
https://github.com/rapid7/metasploit-framework/pull/12844(cve@mitre.org)
https://www.invictuseurope.com/blog/(cve@mitre.org)
http://packetstormsecurity.com/files/172590/Seagate-Central-Storage-2015.0916-User-Creation-Command-Execution.html(af854a3a-2127-422b-91ae-364da2661108)
https://github.com/rapid7/metasploit-framework/pull/12844(af854a3a-2127-422b-91ae-364da2661108)
https://pentest.blog/advisory-seagate-central-storage-remote-code-execution/(af854a3a-2127-422b-91ae-364da2661108)
https://www.invictuseurope.com/blog/(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.