Description
An uncontrolled resource consumption vulnerability issue that could arise by sending crafted requests to a service to consume a large amount of memory, eventually resulting in the service being stopped and restarted was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires the attacker to already have root privileges in order to exploit this vulnerability. This issue affects My Cloud Home and My Cloud Home Duo: before 9.5.1-104; ibi: before 9.5.1-104; My Cloud OS 5: before 5.27.161.
CVSS Metrics
- Vector
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- network
- Complexity
- low
- Privileges
- high
- User Action
- none
- Scope
- unchanged
- Confidentiality
- none
- Integrity
- none
- Availability
- high
- Weaknesses
- CWE-770CWE-400
Metadata
- Primary Vendor
- WESTERNDIGITAL
- Published
- 2/5/2024
- Last Modified
- 11/21/2024
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
westerndigital : my_cloud_pr4100_firmwarewesterndigital : my_cloud_ex4100_firmwarewesterndigital : my_cloud_ex2_ultra_firmwarewesterndigital : my_cloud_mirror_g2_firmwarewesterndigital : my_cloud_dl2100_firmwarewesterndigital : my_cloud_dl4100_firmwarewesterndigital : my_cloud_ex2100_firmwarewesterndigital : my_cloud_glacier_firmwarewesterndigital : wd_cloud_firmwarewesterndigital : my_cloud_home_firmwarewesterndigital : my_cloud_home_duo_firmwarewesterndigital : sandisk_ibi_firmware
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.