First published: Fri Mar 24 2023(Updated: )
SanDisk PrivateAccess versions prior to 6.4.9 support insecure TLS 1.0 and TLS 1.1 protocols which are susceptible to man-in-the-middle attacks thereby compromising confidentiality and integrity of data.
Credit: psirt@wdc.com psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
SanDisk PrivateAccess | <6.4.9 |
We urge our customers to install this software update immediately to keep their vaults protected. As with any upgrade, it is best to back up your data before installing the upgrade.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22812 is a vulnerability in SanDisk PrivateAccess versions prior to 6.4.9 that supports insecure TLS 1.0 and TLS 1.1 protocols.
CVE-2023-22812 has a severity rating of 7.4, which is considered high.
CVE-2023-22812 affects SanDisk PrivateAccess versions prior to 6.4.9 by allowing man-in-the-middle attacks and compromising the confidentiality and integrity of data.
To fix CVE-2023-22812, update SanDisk PrivateAccess to version 6.4.9 or later, which no longer supports insecure TLS 1.0 and TLS 1.1 protocols.
More information about CVE-2023-22812 can be found at the following reference link: [https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update](https://www.westerndigital.com/support/product-security/wdc-23005-sandisk-privateaccess-software-update)