// For flags

CVE-2022-23006

Buffer Overflow Vulnerability in Western Digital My Cloud Home Products and SanDisk ibi

Severity Score

6.7
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.

Se ha encontrado una vulnerabilidad de desbordamiento de búfer en la región stack de la memoria en Western Digital My Cloud Home, My Cloud Home Duo y SanDisk ibi que podría permitir a un atacante que acceda al sistema localmente leer información del archivo /etc/version. Esta vulnerabilidad sólo puede ser explotada encadenándola con otro problema. Si un atacante es capaz de conducir un ataque de ejecución de código remota, puede conseguir acceso al archivo vulnerable, debido a una presencia de funciones no seguras en el código. Es requerida una interacción del usuario para la explotación. La explotación de la vulnerabilidad podría resultar en una exposición de información, la posibilidad de modificar archivos, a errores de acceso a la memoria o a bloqueos del sistema

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
High
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-01-10 CVE Reserved
  • 2022-09-27 CVE Published
  • 2024-04-19 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-121: Stack-based Buffer Overflow
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Westerndigital
Search vendor "Westerndigital"
My Cloud Home Firmware
Search vendor "Westerndigital" for product "My Cloud Home Firmware"
< 8.10.0-117
Search vendor "Westerndigital" for product "My Cloud Home Firmware" and version " < 8.10.0-117"
-
Affected
in Westerndigital
Search vendor "Westerndigital"
My Cloud Home
Search vendor "Westerndigital" for product "My Cloud Home"
--
Safe
Westerndigital
Search vendor "Westerndigital"
My Cloud Home Duo Firmware
Search vendor "Westerndigital" for product "My Cloud Home Duo Firmware"
< 8.10.0-117
Search vendor "Westerndigital" for product "My Cloud Home Duo Firmware" and version " < 8.10.0-117"
-
Affected
in Westerndigital
Search vendor "Westerndigital"
My Cloud Home Duo
Search vendor "Westerndigital" for product "My Cloud Home Duo"
--
Safe
Westerndigital
Search vendor "Westerndigital"
Sandisk Ibi Firmware
Search vendor "Westerndigital" for product "Sandisk Ibi Firmware"
< 8.10.0-117
Search vendor "Westerndigital" for product "Sandisk Ibi Firmware" and version " < 8.10.0-117"
-
Affected
in Westerndigital
Search vendor "Westerndigital"
Sandisk Ibi
Search vendor "Westerndigital" for product "Sandisk Ibi"
--
Safe