Western Digital has blocked access to its cloud services for devices running firmware versions impacted by a known and critical security vulnerability.
The move, which began on June 15, comes one month after the company released firmware updates for its My Cloud product line to address multiple security defects, including a critical path traversal bug that leads to remote code execution (RCE).
The issue is tracked as CVE-2022-36327 and carries CVSS severity score of 9.8/10. According to a NIST advisory, the flaw “could allow an attacker to write files to locations with certain critical filesystem types.”
The flaw impacts Western Digital’s My Cloud Home, My Cloud Home Duo, SanDisk ibi, and My Cloud OS 5 devices and requires the attackers to first trigger an authentication bypass vulnerability.
On May 15, Western Digital released My Cloud OS 5 firmware version 5.26.202 to resolve this bug and three other medium-severity issues, including an uncontrolled resource consumption flaw leading to denial-of-service (DoS), a path traversal issue leading to sensitive information disclosure, and a server-side request forgery (SSRF) bug leading to the exploitation of other vulnerabilities.
On May 26, the company released firmware version 9.4.1-101 to resolve the SSRF bug in My Cloud Home, My Cloud Home Duo, and SanDisk ibi devices.
Starting June 15, devices running firmware versions prior to 5.26.202 or 9.4.1-101 can no longer connect to Western Digital cloud services, the company notes in an advisory.
While My Cloud OS 5 users can still access their data on these devices locally, My Cloud Home, My Cloud Home Duo, and SanDisk ibi users will not be able to access their data until they update their devices to the latest firmware release, the company explains.
By blocking unpatched devices from accessing My Cloud services, Western Digital essentially prevents them from falling victim to cyberattacks that could potentially lead to severe data compromise.