First published: Mon Sep 19 2022(Updated: )
WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.
Credit: psirt@wdc.com psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Westerndigital Wd Discovery | <4.4.396 | |
Westerndigital Wd Discovery | <4.4.396 |
Users can download the latest version from the WD Discovery Downloads page [https://support.wdc.com/downloads.aspx?p=294&lang=en] or by following the instructions on the WD Discovery: Online User Guide [https://support-en.wd.com/app/answers/detailweb/a_id/20465].
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-29835 refers to a vulnerability in the WD Discovery software, where the executable files were signed with an unsafe SHA-1 hashing algorithm.
CVE-2022-29835 can impact the confidentiality of user content due to the possibility of forged certificate signatures.
CVE-2022-29835 has a severity rating of 5.3, which is considered medium.
WD Discovery software versions up to 4.4.396 for both macOS and Windows are affected by CVE-2022-29835.
To fix CVE-2022-29835, users should update their WD Discovery software to a version beyond 4.4.396.