First published: Fri Aug 02 2024(Updated: )
WD Discovery versions prior to 5.0.589 contain a misconfiguration in the Node.js environment settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable. Any malicious application operating with standard user permissions can exploit this vulnerability, enabling code execution within WD Discovery application's context. WD Discovery version 5.0.589 addresses this issue by disabling certain features and fuses in Electron. The attack vector for this issue requires the victim to have the WD Discovery app installed on their device.
Credit: psirt@wdc.com
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital WD Discovery | <5.0.589 |
Users can download the latest version from the WD Discovery Downloads page or by following the instructions on the WD Discovery: Online User Guide https://support-en.wd.com/app/answers/detailweb/a_id/20465
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22169 is classified as a high severity vulnerability due to its potential for code execution.
To mitigate CVE-2024-22169, users should upgrade WD Discovery to version 5.0.589 or later.
CVE-2024-22169 affects users of WD Discovery versions prior to 5.0.589.
CVE-2024-22169 can be exploited through malicious applications leveraging the 'ELECTRON_RUN_AS_NODE' environment variable.
CVE-2024-22169 is primarily a concern for systems running WD Discovery with configurations that allow the exploitation of its Node.js environment.