Lucene search

K
cvelistWDC PSIRTCVELIST:CVE-2022-23006
HistorySep 27, 2022 - 1:53 p.m.

CVE-2022-23006 Buffer Overflow Vulnerability in Western Digital My Cloud Home Products and SanDisk ibi

2022-09-2713:53:29
CWE-121
WDC PSIRT
www.cve.org
buffer overflow
western digital
sandisk
my cloud home
my cloud home duo
remote code execution
user interaction
insecure functions
system access

1.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.7%

A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.

CNA Affected

[
  {
    "platforms": [
      "Linux"
    ],
    "product": "My Cloud Home",
    "vendor": "Western Digital",
    "versions": [
      {
        "lessThan": "8.10.0-117",
        "status": "affected",
        "version": "8.10.0-117",
        "versionType": "custom"
      }
    ]
  },
  {
    "platforms": [
      "Linux"
    ],
    "product": "My Cloud Home Duo",
    "vendor": "Western Digital",
    "versions": [
      {
        "lessThan": "8.10.0-117",
        "status": "affected",
        "version": "8.10.0-117",
        "versionType": "custom"
      }
    ]
  },
  {
    "platforms": [
      "Linux"
    ],
    "product": "ibi",
    "vendor": "SanDisk",
    "versions": [
      {
        "lessThan": "8.10.0-117",
        "status": "affected",
        "version": "8.10.0-117",
        "versionType": "custom"
      }
    ]
  }
]

1.8 Low

CVSS3

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

30.7%

Related for CVELIST:CVE-2022-23006