First published: Thu Jan 13 2022(Updated: )
A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital MyCloud PR4100 | ||
Westerndigital My Cloud Os | <5.19.117 | |
Westerndigital My Cloud | ||
Westerndigital My Cloud Dl2100 | ||
Westerndigital My Cloud Dl4100 | ||
Westerndigital My Cloud Ex2 Ultra | ||
Westerndigital My Cloud Ex2100 | ||
Westerndigital My Cloud Ex4100 | ||
Westerndigital My Cloud Mirror Gen 2 | ||
Westerndigital My Cloud Pr2100 | ||
Westerndigital My Cloud Pr4100 | ||
Westerndigital Wd Cloud |
Update your My Cloud device to firmware version 5.19.117.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-22990.
The title of this vulnerability is (Pwn2Own) Western Digital MyCloud PR4100 nasAdmin Authentication Bypass Vulnerability.
The severity of CVE-2022-22990 is high (8.8).
CVE-2022-22990 allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100.
No, authentication is not required to exploit CVE-2022-22990.
You can find more information about CVE-2022-22990 at the following references: [link1](https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117), [link2](https://www.zerodayinitiative.com/advisories/ZDI-22-347/), [link3](https://www.zerodayinitiative.com/advisories/ZDI-22-076/).
To fix the CVE-2022-22990 vulnerability, you should update your Western Digital MyCloud PR4100 firmware to version 5.19.117 or later.