Firmware updates are now available to resolve the “Zero Day Vulnerability”. The latest available updates for your product can be found using the links below:
Protect Your Device from Remote Hacking
Ensure You Have the Latest Updates
Some customers are concerned about the risk of having their NAS remotely hacked through the Internet. Some actions that a Seagate Business Storage NAS user can take to avoid exposing the NAS are listed below.
Note: Remote Access using Global Access/TappIn will still work after following these steps.Disable UPnP Port Forwarding in the Business Storage NAS Manager Page
- Use the Seagate NAS Discovery Software to launch the Business Storage NAS Manager page in a browser. The NAS Hostname or IP Address may also be used with a browser to launch the NAS Manager page.
- Login to the NAS Manager Page as an Administrator.
- On the left side, click Network then Web Services.
- Disable “UPnP Port Forwarding for Web Access & FTP Service.”
- Click on Submit.
Log into your router’s setup web page.
Note: Please consult the router manufacturer’s documentation for help with this process.
Navigate to the port forwarding section.
Disable mapping for HTTP and HTTPS protocols related to the Seagate NAS box.
The default ports are 80 for HTTP and 443 for HTTPS.
Save the settings.
Ensure that you have a firewall set up to secure your network and that it is configured to allow only trusted systems to communicate to the NAS via HTTP and HTTPS.Protect Your Device within Your Local Network or Intranet
Physically secure the NAS by ensuring it is stored in room or area where only NAS admins have access to the device.
Ensure that you have a firewall set up to secure your network and that it is configured to allow only trusted systems to communicate to the NAS via HTTP and HTTPS