This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability. The specific flaw exists within the nasAdmin service, which listens on TCP ports 80 and 443 by default. The issue results from incorrect string matching logic when accessing protected pages. An attacker can leverage this vulnerability to bypass authentication on the system.
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital My Cloud PR4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15888 is high as it allows authentication bypass for network-adjacent attackers.
To fix ZDI-CAN-15888, update the firmware of your Western Digital MyCloud PR4100 to the latest version provided by the vendor.
ZDI-CAN-15888 affects installations of Western Digital MyCloud PR4100 that have the vulnerable nasAdmin service running.
ZDI-CAN-15888 cannot be exploited remotely as it requires network-adjacency to execute the attack.
The nature of the vulnerability in ZDI-CAN-15888 lies in the failure of the nasAdmin service to enforce authentication.