Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-22991


A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.


Published

2022-01-13T21:15:08.980

Last Modified

2024-11-21T06:47:45.503

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.8 (HIGH)

CVSSv2 Vector

AV:A/AC:L/Au:N/C:C/I:C/A:C

  • Access Vector: ADJACENT_NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

6.5

Impact Score

10.0

Weaknesses
  • Type: Secondary
    CWE-78
  • Type: Primary
    CWE-77

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System westerndigital my_cloud_os < 5.19.117 Yes
Hardware westerndigital my_cloud - No
Hardware westerndigital my_cloud_dl2100 - No
Hardware westerndigital my_cloud_dl4100 - No
Hardware westerndigital my_cloud_ex2_ultra - No
Hardware westerndigital my_cloud_ex2100 - No
Hardware westerndigital my_cloud_ex4100 - No
Hardware westerndigital my_cloud_mirror_gen_2 - No
Hardware westerndigital my_cloud_pr2100 - No
Hardware westerndigital my_cloud_pr4100 - No
Hardware westerndigital wd_cloud - No

References