CWE
22
Advisory Published
Updated

CVE-2022-36328: Path Traversal Vulnerability leading to an arbitrary file read in Western Digital devices

First published: Thu May 18 2023(Updated: )

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could allow an attacker to create arbitrary shares on arbitrary directories and exfiltrate sensitive files, passwords, users and device configurations was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This can only be exploited once an attacker gains root privileges on the devices using an authentication bypass issue or another vulnerability.This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191; My Cloud OS 5: before 5.26.202.

Credit: psirt@wdc.com

Affected SoftwareAffected VersionHow to fix
Westerndigital My Cloud Os 5<5.26.202
Westerndigital My Cloud
Westerndigital My Cloud Dl2100
Westerndigital My Cloud Dl4100
Westerndigital My Cloud Ex2 Ultra
Westerndigital My Cloud Ex2100
Westerndigital My Cloud Ex4100
Westerndigital My Cloud Mirror G2
Westerndigital My Cloud Pr2100
Westerndigital My Cloud Pr4100
Westerndigital Wd Cloud
Westerndigital My Cloud Home Firmware<9.4.0-191
Westerndigital My Cloud Home
Westerndigital Sandisk Ibi Firmware<9.4.0-191
Westerndigital Sandisk Ibi
Westerndigital My Cloud Home Duo Firmware<9.4.0-191
Westerndigital My Cloud Home Duo

Remedy

For My Cloud Home, My Cloud Home Duo and SanDisk ibi devices will be automatically updated to reflect the latest firmware version. For My Cloud OS 5 devices, Western Digital recommends that users promptly update their devices to the latest firmware by clicking on the firmware update notification.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the CWE ID for CVE-2022-36328?

    The CWE ID for CVE-2022-36328 is 22.

  • What is the severity of CVE-2022-36328?

    The severity of CVE-2022-36328 is medium with a CVSS score of 4.9.

  • What software is affected by CVE-2022-36328?

    The Western Digital My Cloud OS 5 with versions up to 5.26.202 is affected by CVE-2022-36328.

  • How can an attacker exploit CVE-2022-36328?

    An attacker can exploit CVE-2022-36328 by creating arbitrary shares on arbitrary directories and exfiltrating sensitive files, passwords, users, and device configurations.

  • Are Western Digital My Cloud and other related products vulnerable to CVE-2022-36328?

    No, Western Digital My Cloud, My Cloud DL2100, My Cloud DL4100, My Cloud Ex2 Ultra, My Cloud Ex2100, My Cloud Ex4100, My Cloud Mirror G2, My Cloud PR2100, My Cloud PR4100, and WD Cloud are not vulnerable to CVE-2022-36328.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203