A malicious user on the same LAN could use DNS spoofing followed by a command injection attack to trick a NAS device into loading through an unsecured HTTP call. Addressed this vulnerability by disabling checks for internet connectivity using HTTP.
2022-01-13T21:15:08.980
2024-11-21T06:47:45.503
Modified
CVSSv3.1: 7.8 (HIGH)
AV:A/AC:L/Au:N/C:C/I:C/A:C
6.5
10.0
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | westerndigital | my_cloud_os | < 5.19.117 | Yes |
Hardware | westerndigital | my_cloud | - | No |
Hardware | westerndigital | my_cloud_dl2100 | - | No |
Hardware | westerndigital | my_cloud_dl4100 | - | No |
Hardware | westerndigital | my_cloud_ex2_ultra | - | No |
Hardware | westerndigital | my_cloud_ex2100 | - | No |
Hardware | westerndigital | my_cloud_ex4100 | - | No |
Hardware | westerndigital | my_cloud_mirror_gen_2 | - | No |
Hardware | westerndigital | my_cloud_pr2100 | - | No |
Hardware | westerndigital | my_cloud_pr4100 | - | No |
Hardware | westerndigital | wd_cloud | - | No |