First published: Tue Dec 01 2020(Updated: )
An issue was discovered on Western Digital My Cloud OS 5 devices before 5.06.115. A NAS Admin authentication bypass vulnerability could allow an unauthenticated user to execute privileged commands on the device via a cookie. (In addition, an upload endpoint could then be used by an authenticated administrator to upload executable PHP scripts.)
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital MyCloud PR4100 | ||
Westerndigital My Cloud Os 5 | <5.06.115 | |
Westerndigital My Cloud Ex2 Ultra | ||
Westerndigital My Cloud Ex4100 | ||
Westerndigital My Cloud Mirror Gen 2 | ||
Westerndigital My Cloud Pr2100 | ||
Westerndigital My Cloud Pr4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-28970 is a vulnerability that allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100.
CVE-2020-28970 has a severity rating of 9.8 (Critical).
CVE-2020-28970 exploits a flaw in the nasAdmin service, which listens on TCP port 80 and 443, allowing attackers to bypass authentication.
Western Digital MyCloud PR4100 with My Cloud OS 5 up to version 5.06.115 is affected by CVE-2020-28970.
To fix CVE-2020-28970, update your Western Digital MyCloud PR4100 to firmware version 5.06.115 or higher.