Skip to content

Tiger3080/CVE-2025-9267

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 

Repository files navigation

CVE-2025-9267

Description

In Seagate Toolkit on Windows there is an insecure DLL-loading vulnerability in the Toolkit Installer (prior to version 2.35.0.6) where the installer attempts to load DLLs from the current working directory without validating their origin or integrity. An attacker who can place a malicious DLL in the same directory as the installer executable (for example by controlling the working/install directory) can cause the installer to load and execute that DLL with the privileges of the user running the installer, leading to arbitrary code execution. The issue stems from insecure DLL-loading practices such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

Affected Product

  • Vendor: Seagate Technology
  • Product: Seagate Toolkit
  • Platform: Windows
  • Version: Prior to 2.35.0.6
  • Component: Service executable path

Vulnerability Details

  • Vulnerability Type:
    • CWE-427 — Uncontrolled Search Path Element
    • CWE-426 — Untrusted Search Path
  • Attack Type: Local
  • Impact:
    • Escalation to SYSTEM privileges
  • CVE ID: CVE-2025-9267
  • CVSS Score (CNA): 7.0 (High)
  • CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Discoverer

Natthawut Saexu

Proof of Concept (PoC)

The tester prepared a malicious DLL and a script to continuously copy it to the user-controlled path. PoC Screenshot

The tester ran the installer and changed the installation path to a user-controllable location. PoC Screenshot

After the installation completed, the tester gained a reverse shell back to the attack machine with SYSTEM privileges. PoC Screenshot PoC Screenshot

References

About

Seagate Toolkit for Windows (Installer <2.35.0.6) is vulnerable to insecure DLL loading. The installer loads DLLs from the working directory without validation, allowing attackers to place a malicious DLL alongside the installer and execute arbitrary code.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors