First published: Fri Jan 28 2022(Updated: )
A command injection remote code execution vulnerability was discovered on Western Digital My Cloud Devices that could allow an attacker to execute arbitrary system commands on the device. The vulnerability was addressed by escaping individual arguments to shell functions coming from user input.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital MyCloud PR4100 | ||
Westerndigital My Cloud Os | <5.19.117 | |
Westerndigital My Cloud | ||
Westerndigital My Cloud Dl2100 | ||
Westerndigital My Cloud Dl4100 | ||
Westerndigital My Cloud Ex2 Ultra | ||
Westerndigital My Cloud Ex2100 | ||
Westerndigital My Cloud Ex4100 | ||
Westerndigital My Cloud Mirror Gen 2 | ||
Westerndigital My Cloud Pr2100 | ||
Westerndigital My Cloud Pr4100 | ||
Westerndigital Wd Cloud |
Update your My Cloud device to firmware version 5.19.117.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-22992 is critical with a CVSS score of 9.8.
CVE-2022-22992 allows network-adjacent attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100.
Yes, authentication is required to exploit CVE-2022-22992, although the existing authentication mechanism can be bypassed.
Western Digital MyCloud PR4100 with My Cloud OS version up to (exclusive) 5.19.117 is affected by CVE-2022-22992.
To fix CVE-2022-22992, it is recommended to update to My Cloud OS firmware version 5.19.117 or higher.