Description
Server-side request forgery (SSRF) vulnerability that could allow a rogue server on the local network to modify its URL using another DNS address to point back to the loopback adapter. This could then allow the URL to exploit other vulnerabilities on the local server. This was addressed by fixing DNS addresses that refer to loopback. This issue affects My Cloud OS 5 devices before 5.27.161, My Cloud Home, My Cloud Home Duo and SanDisk ibi devices before 9.5.1-104.
CVSS Metrics
- Vector
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N
- Attack Vector
- local
- Complexity
- low
- Privileges
- low
- User Action
- none
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- high
- Availability
- none
- Weaknesses
- CWE-918CWE-918
Metadata
- Primary Vendor
- WESTERNDIGITAL
- Published
- 2/5/2024
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
westerndigital : my_cloud_pr2100_firmwarewesterndigital : my_cloud_pr4100_firmwarewesterndigital : my_cloud_ex4100_firmwarewesterndigital : my_cloud_ex2_ultra_firmwarewesterndigital : my_cloud_mirror_g2_firmwarewesterndigital : my_cloud_dl2100_firmwarewesterndigital : my_cloud_dl4100_firmwarewesterndigital : my_cloud_ex2100_firmwarewesterndigital : my_cloud_glacier_firmwarewesterndigital : wd_cloud_firmwarewesterndigital : my_cloud_home_firmwarewesterndigital : my_cloud_home_duo_firmwarewesterndigital : sandisk_ibi_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.