CVE-2022-22989

9.8 CRITICAL

📋 TL;DR

CVE-2022-22989 is a critical pre-authentication stack overflow vulnerability in My Cloud OS 5's FTP service that allows unauthenticated attackers on the same network to execute arbitrary code. This affects Western Digital My Cloud devices running vulnerable firmware versions. Attackers can gain full control of affected devices without any credentials.

💻 Affected Systems

Products:
  • Western Digital My Cloud devices running My Cloud OS 5
Versions: My Cloud OS 5 versions prior to 5.19.117
Operating Systems: My Cloud OS 5
Default Config Vulnerable: ⚠️ Yes
Notes: FTP service is typically enabled by default on affected devices. All network-accessible devices with vulnerable firmware are at risk.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise leading to data theft, ransomware deployment, lateral movement to other network devices, and persistent backdoor installation.

🟠

Likely Case

Remote code execution resulting in data exfiltration, device takeover for botnet participation, or crypto-mining malware installation.

🟢

If Mitigated

Limited impact if FTP service is disabled or network segmentation prevents access, though device remains vulnerable to local network attacks.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication and has public exploit code available, making it easily weaponizable by attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: My Cloud OS 5 firmware version 5.19.117 or later

Vendor Advisory: https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117

Restart Required: Yes

Instructions:

1. Log into My Cloud web interface. 2. Navigate to Settings > Firmware. 3. Check for updates and install version 5.19.117 or later. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Disable FTP Service

all

Completely disable the FTP service to eliminate the attack vector

Navigate to Settings > Network Services > FTP and toggle to OFF

Network Segmentation

all

Isolate My Cloud devices on separate VLAN or network segment

🧯 If You Can't Patch

  • Disable FTP service immediately through device web interface
  • Implement strict network access controls to block all inbound traffic to port 21/tcp

🔍 How to Verify

Check if Vulnerable:

Check firmware version in My Cloud web interface under Settings > Firmware. If version is below 5.19.117, device is vulnerable.

Check Version:

Check via web interface or SSH: cat /etc/version

Verify Fix Applied:

Confirm firmware version shows 5.19.117 or higher in Settings > Firmware after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP connection attempts from unknown IPs
  • Multiple failed FTP connections followed by successful exploit patterns
  • System logs showing abnormal process creation

Network Indicators:

  • Unusual outbound connections from My Cloud device
  • Traffic to port 21/tcp from unexpected sources
  • Exploit pattern detection in FTP traffic

SIEM Query:

source="mycloud" AND (port=21 OR protocol="ftp") AND (event_type="connection" OR event_type="exploit")

🔗 References

📤 Share & Export