The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.
History

Fri, 15 Aug 2025 16:30:00 +0000

Type Values Removed Values Added
References

Fri, 15 Aug 2025 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Seagate
Seagate toolkit
Vendors & Products Seagate
Seagate toolkit

Thu, 14 Aug 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 14 Aug 2025 16:45:00 +0000

Type Values Removed Values Added
Description The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.
Weaknesses CWE-428
References
Metrics cvssV4_0

{'score': 6.7, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Seagate

Published: 2025-08-14T16:27:05.364Z

Updated: 2025-08-15T16:03:30.998Z

Reserved: 2025-08-14T15:57:53.887Z

Link: CVE-2025-9043

cve-icon Vulnrichment

Updated: 2025-08-15T16:03:30.998Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-08-14T17:15:42.610

Modified: 2025-08-15T16:15:31.217

Link: CVE-2025-9043

cve-icon Redhat

No data.