The Western Digital My Cloud Web App [https://os5.mycloud.com/] uses a weak SSLContext when attempting to configure port forwarding rules. This was enabled to maintain compatibility with old or outdated home routers. By using an "SSL" context instead of "TLS" or specifying stronger validation, deprecated or insecure protocols are permitted. As a result, a local user with no privileges can exploit this vulnerability and jeopardize the integrity, confidentiality and authenticity of information transmitted. The scope of impact cannot extend to other components and no user input is required to exploit this vulnerability.

Project Subscriptions

Vendors Products
Westerndigital Subscribe
My Cloud Subscribe
My Cloud Dl2100 Subscribe
My Cloud Dl2100 Firmware Subscribe
My Cloud Dl4100 Subscribe
My Cloud Dl4100 Firmware Subscribe
My Cloud Ex2100 Subscribe
My Cloud Ex2100 Firmware Subscribe
My Cloud Ex2 Ultra Subscribe
My Cloud Ex2 Ultra Firmware Subscribe
My Cloud Ex4100 Subscribe
My Cloud Ex4100 Firmware Subscribe
My Cloud Firmware Subscribe
My Cloud Mirror G2 Subscribe
My Cloud Mirror G2 Firmware Subscribe
My Cloud Pr2100 Subscribe
My Cloud Pr2100 Firmware Subscribe
My Cloud Pr4100 Subscribe
My Cloud Pr4100 Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-28111 The Western Digital My Cloud Web App [https://os5.mycloud.com/] uses a weak SSLContext when attempting to configure port forwarding rules. This was enabled to maintain compatibility with old or outdated home routers. By using an "SSL" context instead of "TLS" or specifying stronger validation, deprecated or insecure protocols are permitted. As a result, a local user with no privileges can exploit this vulnerability and jeopardize the integrity, confidentiality and authenticity of information transmitted. The scope of impact cannot extend to other components and no user input is required to exploit this vulnerability.
Fixes

Solution

To take advantage of the latest security fixes, Western Digital recommends that users promptly update their devices to the latest firmware by clicking on the firmware update notification.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: WDC PSIRT

Published:

Updated: 2024-08-03T03:28:43.001Z

Reserved: 2022-01-10T00:00:00

Link: CVE-2022-23000

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-07-25T19:15:30.787

Modified: 2024-11-21T06:47:46.717

Link: CVE-2022-23000

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses