Description
A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
Published: 2022-09-27
Score: 1.8 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Your device will be automatically updated to the latest firmware version.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-28117 A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
History

Wed, 21 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Westerndigital My Cloud Home My Cloud Home Duo My Cloud Home Duo Firmware My Cloud Home Firmware Sandisk Ibi Sandisk Ibi Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: WDC PSIRT

Published:

Updated: 2025-05-21T15:09:24.355Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2022-23006

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:42.880Z

cve-icon NVD

Status : Modified

Published: 2022-09-27T23:15:12.720

Modified: 2024-11-21T06:47:47.487

Link: CVE-2022-23006

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses