The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.
History

Thu, 21 Aug 2025 15:30:00 +0000

Type Values Removed Values Added
References

Thu, 21 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
References

Fri, 15 Aug 2025 16:30:00 +0000

Type Values Removed Values Added
References

Fri, 15 Aug 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Seagate
Seagate toolkit
Vendors & Products Seagate
Seagate toolkit

Thu, 14 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 16:45:00 +0000

Type Values Removed Values Added
Description The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Seagate

Published: 2025-08-14T16:27:05.364Z

Updated: 2025-08-21T14:16:46.354Z

Reserved: 2025-08-14T15:57:53.887Z

Link: CVE-2025-9043

cve-icon Vulnrichment

Updated: 2025-08-21T14:16:46.354Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T17:15:42.610

Modified: 2025-08-21T15:15:34.860

Link: CVE-2025-9043

cve-icon Redhat

No data.