Vulnerability fixed in network-attached storage devices of Western Digital
January 12, 2025
Cybersecurity

Vulnerability fixed in network-attached storage devices of Western Digital

Positive Technologies, an industry leader in results-oriented cybersecurity and a primary global provider of information security solutions, has helped fix a dangerous vulnerability in the firmware of Western Digital’s network-attached storage devices.

Were it not for Positive Technologies’ expert Nikita Abramov’s detection, an authenticated attacker could exploit the vulnerability to inject malware into a target device and remotely access files.

The vulnerability could lead to remote execution of arbitrary code on storage devices, data loss, and breach of confidential information.

Positive Technologies notified California-based Western Digital of the threat as part of a mutually responsible disclosure policy. They released patches to fix the issues, which Western Digital dutifully acknowledged.

Cybersecurity specialist

Headquartered in Moscow, Russia, Positive Technologies specialises in safeguarding businesses and industries against cyberattacks and non-tolerable damage.

The CVE-2023-22815 vulnerability (scored 8.8 on the CVSS 3.0 scale) was detected in Western Digital’s My Cloud OS 5 firmware, v5.23.114.

This software is used across Western Digital’s network devices: My Cloud PR2100, My Cloud PR4100, My Cloud EX4100, My Cloud EX2 Ultra, My Cloud Mirror G2, and others.

Given the threat, data storage solutions provider Western Digital recommends installing the updated My Cloud OS 5 v5.26.300 firmware on all affected devices.

Nikita Abramov, Specialist of the Security Weakness Advanced Research and Modeling Center (PT SWARM) Positive Technologies, said: “The most dangerous scenario is a complete seizure of control over NAS (network attached storage, a file storage server).

“All further steps depend on the attacker’s objectives: stealing, modifying, or completely removing data, and possibly deploying malware. The vulnerability is likely caused by adding new functionality to NAS without proper security checks.”

Vulnerable IP addresses

As of August 24, 2023, the IP addresses of over 2,400 of Western Digital’s network-attached storage devices were available on the internet.

The bulk of the IP addresses were in Germany (460), the United States (310), Italy (257), the UK (131), and South Korea (125).

The IP addresses of 67 of Western Digital’s network-attached storage devices in the Middle East region were also available online.

Positive Technologies has urged companies to build vulnerability management processes.

The cybersecurity provider also noted that businesses must regularly update software in use, carefully monitor their crucial data assets, and focus on trending vulnerabilities first.

In 2022, Positive Technologies’ PT SWARM 60-member offensive security expert team helped eliminate 85 critical vulnerabilities in products of the largest manufacturers used in numerous industries worldwide.

More than 3,300 organisations globally use Positive Technologies’ proprietary technologies and services.

Arnold Pinto

Arnold Pinto

Arnold Pinto is an award-winning journalist with wide-ranging Middle East and Asia experience in the tech, aerospace, defence, luxury watchmaking, business, automotive, and fashion verticals. He is passionate about conserving endangered native wildlife globally. Arnold enjoys 4x4 off-roading, camping and exploring global destinations off the beaten track. Write to: arnold@menews247.com
Follow Me:

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *