CVE-2022-22994
📋 TL;DR
This CVE describes a remote code execution vulnerability in Western Digital My Cloud NAS devices where attackers can exploit insufficient verification of HTTP calls to trick the device into loading malicious content. The vulnerability allows unauthenticated attackers to execute arbitrary code on affected devices. All users of vulnerable Western Digital My Cloud devices are affected.
💻 Affected Systems
- Western Digital My Cloud NAS devices
📦 What is this software?
My Cloud Os by Westerndigital
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the NAS device, allowing attackers to steal all stored data, install persistent malware, pivot to other network devices, or use the device for cryptocurrency mining or botnet activities.
Likely Case
Data theft, ransomware deployment, or device takeover for malicious purposes like DDoS attacks or unauthorized data access.
If Mitigated
Limited impact if devices are behind firewalls with strict inbound rules and network segmentation, though lateral movement risk remains if compromised.
🎯 Exploit Status
The vulnerability requires network access but no authentication, making exploitation straightforward for attackers with access to the device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: My Cloud OS5 firmware 5.19.117
Vendor Advisory: https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
Restart Required: Yes
Instructions:
1. Log into My Cloud device management interface. 2. Navigate to Settings > Firmware Update. 3. Check for updates and install firmware version 5.19.117 or later. 4. Reboot the device after installation completes.
🔧 Temporary Workarounds
Network Segmentation
allIsolate My Cloud devices from the internet and restrict access to trusted internal networks only.
Firewall Rules
allBlock inbound HTTP/HTTPS traffic to My Cloud devices from untrusted networks.
🧯 If You Can't Patch
- Disconnect device from internet entirely and use only on isolated internal network
- Implement strict network access controls allowing only specific IP addresses to connect
🔍 How to Verify
Check if Vulnerable:
Check firmware version in device management interface under Settings > Firmware Update. If version is below 5.19.117, device is vulnerable.
Check Version:
Check via web interface: Settings > Firmware Update
Verify Fix Applied:
Confirm firmware version shows 5.19.117 or higher in device management interface after update.
📡 Detection & Monitoring
Log Indicators:
- Unusual HTTP requests to device management interface
- Unexpected process execution or file modifications
- Failed authentication attempts followed by successful exploitation
Network Indicators:
- Unusual outbound connections from NAS device
- HTTP traffic to device from unexpected sources
- Port scanning activity targeting NAS management ports
SIEM Query:
source="mycloud" AND (http_request="*" AND NOT user_agent="*normal*" OR process="unusual_executable")
🔗 References
- https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
- https://www.zerodayinitiative.com/advisories/ZDI-22-349/
- https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117
- https://www.zerodayinitiative.com/advisories/ZDI-22-349/