This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the cloudAccess endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital My Cloud PR4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-22-076 is classified as high due to the potential for arbitrary code execution.
To fix ZDI-22-076, update the firmware of the Western Digital MyCloud PR4100 to the latest version provided by Western Digital.
ZDI-22-076 affects installations of the Western Digital MyCloud PR4100 that are not using the latest firmware.
ZDI-22-076 involves network-adjacent attacks that exploit a flaw in the authentication mechanism.
No, ZDI-22-076 requires that the attacker is on the same local network as the affected device.