Advisory Details

September 26th, 2024

Western Digital MyCloud PR4100 ddns-start Heap-based Buffer Overflow Remote Code Execution Vulnerability

ZDI-24-1294
ZDI-CAN-22537

CVE ID CVE-2024-22170
CVSS SCORE 7.5, AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
AFFECTED VENDORS Western Digital
AFFECTED PRODUCTS MyCloud PR4100
VULNERABILITY DETAILS

This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Western Digital MyCloud PR4100. Authentication is not required to exploit this vulnerability.

The specific flaw exists within the handling of HTTP responses provided to the ddns-start program. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length, heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device.

ADDITIONAL DETAILS Western Digital has issued an update to correct this vulnerability. More details can be found at:
https://www.westerndigital.com/support/product-security/wdc-24005-western-digital-my-cloud-os-5-firmware-5-29-102
DISCLOSURE TIMELINE
  • 2024-05-28 - Vulnerability reported to vendor
  • 2024-09-26 - Coordinated public release of advisory
  • 2024-09-26 - Advisory Updated
CREDIT Claroty Research - Team82 - Noam Moshe
BACK TO ADVISORIES