CVE-2022-22994

8.8 HIGH

📋 TL;DR

This CVE describes a remote code execution vulnerability in Western Digital My Cloud NAS devices where attackers can exploit insufficient verification of HTTP calls to trick the device into loading malicious content. The vulnerability allows unauthenticated attackers to execute arbitrary code on affected devices. All users of vulnerable Western Digital My Cloud devices are affected.

💻 Affected Systems

Products:
  • Western Digital My Cloud NAS devices
Versions: My Cloud OS5 firmware versions before 5.19.117
Operating Systems: My Cloud OS5
Default Config Vulnerable: ⚠️ Yes
Notes: Devices with default configurations that expose management interfaces are particularly vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the NAS device, allowing attackers to steal all stored data, install persistent malware, pivot to other network devices, or use the device for cryptocurrency mining or botnet activities.

🟠

Likely Case

Data theft, ransomware deployment, or device takeover for malicious purposes like DDoS attacks or unauthorized data access.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict inbound rules and network segmentation, though lateral movement risk remains if compromised.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires network access but no authentication, making exploitation straightforward for attackers with access to the device.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: My Cloud OS5 firmware 5.19.117

Vendor Advisory: https://www.westerndigital.com/support/product-security/wdc-22002-my-cloud-os5-firmware-5-19-117

Restart Required: Yes

Instructions:

1. Log into My Cloud device management interface. 2. Navigate to Settings > Firmware Update. 3. Check for updates and install firmware version 5.19.117 or later. 4. Reboot the device after installation completes.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate My Cloud devices from the internet and restrict access to trusted internal networks only.

Firewall Rules

all

Block inbound HTTP/HTTPS traffic to My Cloud devices from untrusted networks.

🧯 If You Can't Patch

  • Disconnect device from internet entirely and use only on isolated internal network
  • Implement strict network access controls allowing only specific IP addresses to connect

🔍 How to Verify

Check if Vulnerable:

Check firmware version in device management interface under Settings > Firmware Update. If version is below 5.19.117, device is vulnerable.

Check Version:

Check via web interface: Settings > Firmware Update

Verify Fix Applied:

Confirm firmware version shows 5.19.117 or higher in device management interface after update.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP requests to device management interface
  • Unexpected process execution or file modifications
  • Failed authentication attempts followed by successful exploitation

Network Indicators:

  • Unusual outbound connections from NAS device
  • HTTP traffic to device from unexpected sources
  • Port scanning activity targeting NAS management ports

SIEM Query:

source="mycloud" AND (http_request="*" AND NOT user_agent="*normal*" OR process="unusual_executable")

🔗 References

📤 Share & Export