CVE-2016-10107
📋 TL;DR
This vulnerability allows unauthenticated attackers to execute arbitrary commands as root on Western Digital MyCloud NAS devices by sending a specially crafted Cookie header to the index.php page. It affects Western Digital MyCloud NAS devices running vulnerable firmware versions, potentially giving attackers complete control over the device.
💻 Affected Systems
- Western Digital MyCloud NAS
📦 What is this software?
Mycloud Nas by Western Digital
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the NAS device with root access, allowing data theft, ransomware deployment, or use as a pivot point into internal networks.
Likely Case
Unauthenticated remote code execution leading to data exfiltration, malware installation, or device takeover.
If Mitigated
Limited impact if device is isolated from internet and strict network controls are in place.
🎯 Exploit Status
Exploit requires sending a specially crafted HTTP request with modified Cookie header to the index.php endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Firmware version 2.11.143 or later
Vendor Advisory: https://www.westerndigital.com/support/productsecurity/wdc-16007-western-digital-my-cloud-firmware-version-2-11-143
Restart Required: Yes
Instructions:
1. Log into MyCloud web interface. 2. Navigate to Settings > Firmware. 3. Check for updates and install firmware version 2.11.143 or later. 4. Reboot the device after update.
🔧 Temporary Workarounds
Network Isolation
allBlock external access to MyCloud web interface ports (typically 80/443) at firewall.
Web Interface Disable
allDisable the web interface if not required for functionality.
🧯 If You Can't Patch
- Immediately isolate the device from internet access and restrict to internal network only
- Implement strict network segmentation and monitor for suspicious outbound connections
🔍 How to Verify
Check if Vulnerable:
Check firmware version in MyCloud web interface under Settings > Firmware. If version is 2.11.142 or earlier, device is vulnerable.
Check Version:
Not applicable - check via web interface or WD MyCloud mobile app
Verify Fix Applied:
Verify firmware version is 2.11.143 or later in Settings > Firmware.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to index.php with modified Cookie headers
- Suspicious command execution in system logs
Network Indicators:
- HTTP requests with unusual Cookie values targeting index.php
- Outbound connections from NAS to suspicious IPs
SIEM Query:
http.url:"*index.php*" AND http.cookie:"*;*" AND http.cookie:"*$*"