HomeWesterndigitalCVE-2023-22815

CVE-2023-22815

MEDIUM
6.2CVSS
Published: 2023-06-30
Updated: 2024-11-21
AI Analysis

Description

Post-authentication remote command injection vulnerability in Western Digital My Cloud OS 5 devices that could allow an attacker to execute code in the context of the root user on vulnerable CGI files. This vulnerability can only be exploited over the network and the attacker must already have admin/root privileges to carry out the exploit. An authentication bypass is required for this exploit, thereby making it more complex. The attack may not require user interaction. Since an attacker must already be authenticated, the confidentiality impact is low while the integrity and availability impact is high.  This issue affects My Cloud OS 5 devices: before 5.26.300.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:H
Attack Vector
network
Complexity
high
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
low
Integrity
high
Availability
high
Weaknesses
CWE-78CWE-77

Metadata

Primary Vendor
WESTERNDIGITAL
Published
6/30/2023
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

westerndigital : my_cloud_os

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2023-22815 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com