This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Western Digital MyCloud PR4100. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the cgi_api endpoint. The issue results from the lack of proper validation of URIs prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital My Cloud PR4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The ZDI-22-348 vulnerability is classified as a high-severity privilege escalation flaw.
To address the ZDI-22-348 vulnerability, update the Western Digital MyCloud PR4100 to the latest firmware version released by Western Digital.
ZDI-22-348 affects users of the Western Digital MyCloud PR4100 storage device.
While ZDI-22-348 requires authentication, it can be exploited by network-adjacent attackers who can bypass existing mechanisms.
ZDI-22-348 enables attacks that allow escalated privileges on the affected devices.