Note:
This project will be discontinued after December 13, 2021. [more]
Product:
My_cloud_home_firmware
(Westerndigital)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 14 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2022-03-25 | CVE-2022-22995 | The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code. | Fedora, Netatalk, My_cloud_dl2100_firmware, My_cloud_dl4100_firmware, My_cloud_ex2100_firmware, My_cloud_ex2_ultra_firmware, My_cloud_ex4100_firmware, My_cloud_firmware, My_cloud_home_firmware, My_cloud_mirror_gen_2_firmware, My_cloud_pr2100_firmware, My_cloud_pr4100_firmware, Wd_cloud_firmware | 9.8 | ||
2022-07-12 | CVE-2022-22997 | Addressed a remote code execution vulnerability by resolving a command injection vulnerability and closing an AWS S3 bucket that potentially allowed an attacker to execute unsigned code on My Cloud Home devices. | My_cloud_home_duo_firmware, My_cloud_home_firmware | 9.8 | ||
2022-07-12 | CVE-2022-22998 | Implemented protections on AWS credentials that were not properly protected. | My_cloud_home_duo_firmware, My_cloud_home_firmware | 7.5 | ||
2022-09-27 | CVE-2022-23006 | A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required... | My_cloud_home_duo_firmware, My_cloud_home_firmware, Sandisk_ibi_firmware | 6.7 |