CVE-2021-35941
📋 TL;DR
This vulnerability allows unauthenticated attackers to trigger a factory reset on Western Digital My Book Live and My Book Live Duo network storage devices via an administrator API. This results in complete data loss and device compromise. All users of affected devices are at risk.
💻 Affected Systems
- Western Digital WD My Book Live
- Western Digital WD My Book Live Duo
📦 What is this software?
Wd My Book Live Duo Firmware by Westerndigital
Wd My Book Live Firmware by Westerndigital
⚠️ Risk & Real-World Impact
Worst Case
Complete data loss, device bricking, and potential ransomware deployment or credential theft if attackers restore to malicious firmware.
Likely Case
Mass data wiping and device compromise as seen in real-world attacks in June 2021.
If Mitigated
No impact if devices are properly isolated or patched.
🎯 Exploit Status
Actively exploited in the wild in June 2021. Simple HTTP request to vulnerable API endpoint.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo
Restart Required: No
Instructions:
No official patch exists. Western Digital recommends disconnecting devices from internet and backing up data immediately.
🔧 Temporary Workarounds
Network Isolation
allDisconnect device from internet and place behind firewall with no inbound access.
Block API Access
linuxBlock HTTP/HTTPS access to device at firewall level.
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP
🧯 If You Can't Patch
- Immediately disconnect device from any network and power off.
- Perform full backup of all data and migrate to a supported, secure storage solution.
🔍 How to Verify
Check if Vulnerable:
Check if device model is WD My Book Live (2.x+) or WD My Book Live Duo (any version). If exposed to network, it is vulnerable.
Check Version:
Check device web interface or serial/model number on physical unit.
Verify Fix Applied:
No fix available to verify. Ensure device is completely isolated from networks.
📡 Detection & Monitoring
Log Indicators:
- HTTP POST requests to /api/1.0/restore_factory_defaults endpoint
- Unexpected factory reset events in system logs
Network Indicators:
- HTTP traffic to device on ports 80/443 with POST requests to factory reset API
SIEM Query:
source="mybooklive" AND (uri="/api/1.0/restore_factory_defaults" OR event="factory reset")
🔗 References
- https://arstechnica.com/gadgets/2021/06/hackers-exploited-0-day-not-2018-bug-to-mass-wipe-my-book-live-devices/
- https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo
- https://arstechnica.com/gadgets/2021/06/hackers-exploited-0-day-not-2018-bug-to-mass-wipe-my-book-live-devices/
- https://www.westerndigital.com/support/productsecurity/wdc-21008-recommended-security-measures-wd-mybooklive-wd-mybookliveduo