Show filters
82 Total Results
Displaying 21-30 of 82
Sort by:
Attacker Value
Unknown

CVE-2021-36225

Disclosure Date: February 06, 2023 (last updated October 08, 2023)
Western Digital My Cloud devices before OS5 allow REST API access by low-privileged accounts, as demonstrated by API commands for firmware uploads and installation.
Attacker Value
Unknown

CVE-2021-36224

Disclosure Date: February 06, 2023 (last updated October 08, 2023)
Western Digital My Cloud devices before OS5 have a nobody account with a blank password.
Attacker Value
Unknown

CVE-2022-29844

Disclosure Date: January 26, 2023 (last updated October 08, 2023)
A vulnerability in the FTP service of Western Digital My Cloud OS 5 devices running firmware versions prior to 5.26.119 allows an attacker to read and write arbitrary files. This could lead to a full NAS compromise and would give remote execution capabilities to the attacker.
Attacker Value
Unknown

CVE-2022-29843

Disclosure Date: January 26, 2023 (last updated October 08, 2023)
A command injection vulnerability in the DDNS service configuration of Western Digital My Cloud OS 5 devices running firmware versions prior to 5.26.119 allows an attacker to execute code in the context of the root user.
Attacker Value
Unknown

CVE-2022-29839

Disclosure Date: December 09, 2022 (last updated October 08, 2023)
Insufficiently Protected Credentials vulnerability in the remote backups application on Western Digital My Cloud devices that could allow an attacker who has gained access to a relevant endpoint to use that information to access protected data. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.
Attacker Value
Unknown

CVE-2022-29838

Disclosure Date: December 09, 2022 (last updated October 08, 2023)
Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux.
Attacker Value
Unknown

CVE-2022-29837

Disclosure Date: December 01, 2022 (last updated October 08, 2023)
A path traversal vulnerability was addressed in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi which could allow an attacker to initiate installation of custom ZIP packages and overwrite system files. This could potentially lead to a code execution.
Attacker Value
Unknown

CVE-2022-29836

Disclosure Date: November 09, 2022 (last updated December 22, 2024)
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability was discovered via an HTTP API on Western Digital My Cloud Home; My Cloud Home Duo; and SanDisk ibi devices that could allow an attacker to abuse certain parameters to point to random locations on the file system. This could also allow the attacker to initiate the installation of custom packages at these locations. This can only be exploited once the attacker has been authenticated to the device. This issue affects: Western Digital My Cloud Home and My Cloud Home Duo versions prior to 8.11.0-113 on Linux; SanDisk ibi versions prior to 8.11.0-113 on Linux.
Attacker Value
Unknown

CVE-2022-23006

Disclosure Date: September 27, 2022 (last updated October 08, 2023)
A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
Attacker Value
Unknown

CVE-2022-29835

Disclosure Date: September 19, 2022 (last updated October 08, 2023)
WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.