WD Discovery
versions prior to 5.0.589 contain a misconfiguration in the Node.js environment
settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable.
Any malicious application operating with standard user permissions can exploit
this vulnerability, enabling code execution within WD Discovery application's
context. WD Discovery version 5.0.589 addresses this issue by disabling certain
features and fuses in Electron. The attack vector for this issue requires the victim to have the WD Discovery app installed on their device.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-19765 WD Discovery versions prior to 5.0.589 contain a misconfiguration in the Node.js environment settings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable. Any malicious application operating with standard user permissions can exploit this vulnerability, enabling code execution within WD Discovery application's context. WD Discovery version 5.0.589 addresses this issue by disabling certain features and fuses in Electron. The attack vector for this issue requires the victim to have the WD Discovery app installed on their device.
Fixes

Solution

Users can download the latest version from the WD Discovery Downloads page or by following the instructions on the WD Discovery: Online User Guide https://support-en.wd.com/app/answers/detailweb/a_id/20465


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WDC PSIRT

Published:

Updated: 2024-08-05T18:55:48.270Z

Reserved: 2024-01-05T18:43:18.488Z

Link: CVE-2024-22169

cve-icon Vulnrichment

Updated: 2024-08-05T18:55:40.759Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-08-02T19:16:29.553

Modified: 2024-08-05T12:41:45.957

Link: CVE-2024-22169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.