This vulnerability allows network-adjacent attackers to escalate privileges on affected installations of Western Digital MyCloud PR4100. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed. The specific flaw exists within the cgi_api endpoint. The issue results from the lack of proper validation of URIs prior to accessing resources. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root.
Affected Software | Affected Version | How to fix |
---|---|---|
Western Digital My Cloud PR4100 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-15889 is considered critical due to the potential for privilege escalation.
To mitigate ZDI-CAN-15889, apply the latest firmware updates provided by Western Digital.
ZDI-CAN-15889 can be exploited by network-adjacent attackers with some level of authenticated access.
ZDI-CAN-15889 specifically affects Western Digital MyCloud PR4100 installations.
Yes, user interaction is required as the exploitation of ZDI-CAN-15889 necessitates authentication.