A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.
History

Wed, 21 May 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WDC PSIRT

Published: 2022-09-27T13:53:29.000Z

Updated: 2025-05-21T15:09:24.355Z

Reserved: 2022-01-10T00:00:00.000Z

Link: CVE-2022-23006

cve-icon Vulnrichment

Updated: 2024-08-03T03:28:42.880Z

cve-icon NVD

Status : Modified

Published: 2022-09-27T23:15:12.720

Modified: 2024-11-21T06:47:47.487

Link: CVE-2022-23006

cve-icon Redhat

No data.