Home

Description

In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.

PUBLISHED Reserved 2025-08-20 | Published 2025-09-26 | Updated 2025-09-29 | Assigner Seagate




HIGH: 7.0CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-427 Uncontrolled Search Path Element

CWE-426 Untrusted Search Path

Product status

Default status
unaffected

Any version before 2.35.0.6
affected

References

www.seagate.com/product-security/

www.seagate.com/support/software/toolkit/

cve.org (CVE-2025-9267)

nvd.nist.gov (CVE-2025-9267)

Download JSON