Lucene search

K
WesterndigitalMy Cloud Os

5 matches found

CVE
CVE
added 2022/01/28 8:15 p.m.348 views

CVE-2022-22993

A limited SSRF vulnerability was discovered on Western Digital My Cloud devices that could allow an attacker to impersonate a server and reach any page on the server by bypassing access controls. The vulnerability was addressed by creating a whitelist for valid parameters.

8.8CVSS8.2AI score0.00057EPSS
CVE
CVE
added 2022/01/13 9:15 p.m.74 views

CVE-2022-22991

A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.

8.8CVSS8.4AI score0.00084EPSS
CVE
CVE
added 2022/01/13 9:15 p.m.69 views

CVE-2022-22990

A limited authentication bypass vulnerability was discovered that could allow an attacker to achieve remote code execution and escalate privileges on the My Cloud devices. Addressed this vulnerability by changing access token validation logic and rewriting rule logic on PHP scripts.

8.8CVSS8.9AI score0.016EPSS
CVE
CVE
added 2023/02/06 2:15 p.m.32 views

CVE-2021-36225

Western Digital My Cloud devices before OS5 allow REST API access by low-privileged accounts, as demonstrated by API commands for firmware uploads and installation.

8.8CVSS8.8AI score0.00066EPSS
CVE
CVE
added 2023/06/30 10:15 p.m.25 views

CVE-2023-22816

A post-authentication remote command injection vulnerability in a CGI file in Western Digital My Cloud OS 5 devices that could allow an attacker to build files with redirects and execute larger payloads.This issue affects My Cloud OS 5 devices: before 5.26.300.

8.8CVSS7.2AI score0.00527EPSS