The service executable path in Seagate Toolkit on...
Moderate severity
Unreviewed
Published
Aug 14, 2025
to the GitHub Advisory Database
•
Updated Aug 21, 2025
Description
Published by the National Vulnerability Database
Aug 14, 2025
Published to the GitHub Advisory Database
Aug 14, 2025
Last updated
Aug 21, 2025
The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges.
References