News Security

Positive Technologies Resolves Critical Vulnerability in Western Digital’s NAS Devices

Positive-Technologies

An authenticated attacker could use the vulnerability to inject malware into a target device and remotely access files

Positive Technologies’ Nikita Abramov identifies vulnerability in Western Digital’s NAS device firmware, which could result in remote code execution, data loss, and data breaches. The vendor was promptly notified and issued patches following responsible disclosure.

At the time of writing, IP addresses of 67 of Western Digital’s network-attached storage devices in the Middle East were still available on the global network. 

The CVE-2023-22815 vulnerability (scored 8.8 on the CVSS 3.0 scale) was detected in the firmware of My Cloud OS 5, v5.23.114. This software is used in several Western Digital’s network devices: My Cloud PR2100, My Cloud PR4100, My Cloud EX4100, My Cloud EX2 Ultra, My Cloud Mirror G2, and others. 

“The most dangerous scenario is a complete seizure of control over NAS”

Nikita Abramov, Specialist of the Security Weakness Advanced Research and Modeling Center (PT SWARM)1

Nikita Abramov, Specialist of the Security Weakness Advanced Research and Modeling Center (PT SWARM)1, said, “The most dangerous scenario is a complete seizure of control over NAS (network attached storage, a file storage server). All further steps depend on the attacker’s objectives: stealing, modifying, or completely removing data, and possibly deploying malware. The vulnerability is likely caused by adding new functionality to NAS without proper security checks.”

At the time of writing, IP addresses of more than 2,400 of Western Digital’s network-attached storage devices were available on the global network. Most of them were in Germany (460), the United States (310), Italy (257), the UK (131), and South Korea (125). 

Western Digital recommends installing the updated My Cloud OS 5 v5.26.300 firmware on all affected devices. For a complete list of these devices, see the vendor’s advisory summary.

Positive Technologies recommends that companies build vulnerability management processes. It is necessary to regularly update software in use, carefully monitor a company’s crucial assets, and focus on trending vulnerabilities first. 

Related posts

A CISO Perspective on Implementing Cyber Resilience for Small to Large Law Firms

Enterprise IT World MEA

Customer satisfaction is a top priority at Invicti

Enterprise IT World MEA

SentinelOne Acquired PingSage

Enterprise IT World MEA

Leave a Comment