NewsSecurity Vulnerabilities

Western Digital My Cloud Multiple Vulnerabilities

Three vulnerabilities in Western Digital’s popular “My Cloud” network-attached storage devices for home or small office use have been discovered. These may allow an unauthenticated remote attacker read and write access to a device.

The first vulnerability provides unrestricted upload access to a device. The PHP gethostbyaddr() function found on the My Cloud built-in web server allows user-defined remote authentication servers. A series of bugs in the checks performed on these servers allow an unauthorised user upload access to a device.

A hardcoded backdoor exists in the My Cloud device firmware where the login functionality looks for an administration user with a default password. This backdoor can then be turned into a root shell to provide root access to a device.

The final exploit describes a method for using cross-site request forgery (XSRF) to send faulty commands to perform denial-of-service attacks.

Affected Platforms

  • My Cloud EX2
  • My Cloud EX4
  • My Cloud EX2100
  • My Cloud EX4100
  • My Cloud EX2 Ultra
  • My Cloud DL2100
  • My Cloud DL4100
  • My Cloud PR2100
  • My Cloud PR4100My Cloud Mirror
  • My Cloud Mirror Gen 2

Resolution

Western Digital have reported all issues are fixed in firmware version 2.30.172.

Duncan

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.