In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries.
Metrics
Affected Vendors & Products
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 26 Sep 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 26 Sep 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In Seagate Toolkit on Windows a vulnerability exists in the Toolkit Installer prior to versions 2.35.0.6 where it attempts to load DLLs from the current working directory without validating their origin or integrity. This behavior can be exploited by placing a malicious DLL in the same directory as the installer executable, leading to arbitrary code execution with the privileges of the user running the installer. The issue stems from the use of insecure DLL loading practices, such as relying on relative paths or failing to specify fully qualified paths when invoking system libraries. | |
Weaknesses | CWE-426 CWE-427 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Seagate
Published:
Updated: 2025-09-26T12:54:57.812Z
Reserved: 2025-08-20T14:44:11.379Z
Link: CVE-2025-9267

Updated: 2025-09-26T12:54:55.064Z

Status : Awaiting Analysis
Published: 2025-09-26T13:15:41.967
Modified: 2025-09-26T14:32:19.853
Link: CVE-2025-9267

No data.

No data.