CVE-2025-9043
BaseFortify
Publication date: 2025-08-14
Last updated on: 2025-08-21
Assigner: Seagate Technology
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| seagate | toolkit | 2.35.0.5 |
| seagate | toolkit | 2.34.0.33 |
| seagate | toolkit | 2.35.0.6 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-428 | The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the Seagate Toolkit service executable path on Windows versions prior to 2.34.0.33. It is an Unquoted Search Path or Element issue (CWE-428) that allows an attacker with Admin privileges and write permissions to the root directory to place a malicious Program.exe file. This malicious file would then execute with SYSTEM privileges, potentially allowing the attacker to run code with the highest system permissions.
How can this vulnerability impact me? :
If exploited, this vulnerability can allow an attacker with Admin privileges to escalate their privileges to SYSTEM level by placing a malicious executable in the root directory. This could lead to unauthorized code execution with full system privileges, potentially compromising the entire system's security and integrity.