Default title

Notification on Western Digital MyCloud Series of NAS Drives

March 6, 2017: A Critical Vulnerability has been found in the Western Digital MyCloud Series of NAS Drives

This latest vulnerability presents a very real potential for complete loss of control of the device. If deployed properly, this NAS should be behind a firewall and further secured by design elements that reduce the risk these devices can present to a corporate network.

About the NAS Drive (MyCloud):

The manufacturer of the Hard Drive (Western Digital) is one of the largest hard drive and NAS manufacturers in the world.

There was a previous notification of a similar vulnerability in an older version of the firmware last month.
There is currently no known fix available.
The problem has occurred in the most recent version of the device.
The estimated time to fix the problem has not been posted by the manufacturer.
Well over a million of these devices are in production throughout the world.

A few points about this vulnerability:

An attacker would need to be able to browse to the device's management web page in order to initiate the attack.

The exploit can result in a complete loss of control of the device via a modification of the password fields and bypasses all internal security mechanisms in the device.

An attacker who is able to take control of the NAS device could conceivably perform the following actions (but are not limited to):

Downloading of all of the data from the device to a local or remote system (over the internet).

Deletion all of the data on the device.

Using the device for further attacks.

Staying dormant for a period before performing an attack.

Using the device as a brute-force tool for further internal attacks.

Reselling the access gained to professional attack organizations.

How can ALT8 help?

Assess and Correct Vulnerabilities:

Businesses of all sizes are at risk to cyber attack events. Having vulnerable devices like these in your network will increase your risk exposure.

ALT8 Specialists would be happy to help you assess your risks and develop possible mitigations that will reduce your exposure.

ALT8’s team of security specialists are trained based on the Offensive Cyber Security Methodology.

By thinking Offensively, ALT8 Specialists approach network security from the point of view of an attacker. This presents a distinct advantage to the traditional methodologies of General IT Support Organizations.

Western Digital Publication:

https://community.wd.com/t/my-cloud-login-bypass-vulnerability-3-7-17/198280

Title: Authenticated OS Command Injection & Arbitrary File Upload
Product: Western Digital My Cloud Vulnerable Versions:

2.21.126 (My Cloud), 2.11.157(My Cloud EX2),
2.21.126 (My Cloud EX2 Ultra), 2.11.157 (My Cloud EX4),
2.21.126 (My Cloud EX2100), 2.21.126 (My Cloud EX4100),
2.11.157 (My Cloud Mirror), 2.21.126 (My Cloud Mirror Gen2),
2.21.126 (My Cloud PR2100), 2.21.126 (My Cloud PR4100),
2.21.126 (My Cloud DL2100), 2.21.126 (My Cloud DL4100)

Affected Devices

SEC Consult Vulnerability Disclosure:

https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170307-0_WD_MyCloud_OS_cmd_injection_file_upload_v10.txt

RECENT THREAT POSTS

- Tara Seals
FIN7 Lures Unwitting Security Pros to Carry Out Ransomware Attacks
The infamous Carbanak operator is looking to juice its ransomware game by recruiting IT staff to its fake Bastion Secure "pen-testing" company.
- Lisa Vaas
REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say
A multi-country effort has given ransomware gang REvil a taste of its own medicine by pwning its backups and pushing its leak site and Tor payment site offline.
- Tara Seals
Cisco SD-WAN Security Bug Allows Root Code Execution
The high-severity bug, tracked as CVE-2021-1529, is an OS command-injection flaw.
- Elizabeth Montalbano
Threat Actors Abuse Discord to Push Malware
The platform’s Content Delivery Network and core features are being used to send malicious files—including RATs--across its network of 150 million users, putting corporate workplaces at risk.
- Becky Bracken
U.S. Ban on Sales of Cyberattack Tools Is Anemic, Experts Warn
Meanwhile, Zerodium's quest to buy VPN exploits is problematic, researchers said.
- Tara Seals
TA551 Shifts Tactics to Install Sliver Red-Teaming Tool
A new email campaign from the threat group uses the attack-simulation framework in a likely leadup to ransomware deployment.
- Lisa Vaas
Gigabyte Allegedly Hit by AvosLocker Ransomware
If AvosLocker stole Gigabyte's master keys, threat actors could force hardware to download fake drivers or BIOS updates in a supply-chain attack a la SolarWinds.
- Nate Warfield
Why is Cybersecurity Failing Against Ransomware?
Hardly a week goes by without another major company falling victim to a ransomware attack. Nate Warfield, CTO at Prevailion, discusses the immense challenges in changing that status quo.
- Elizabeth Montalbano
Ransomware Sinks Teeth into Candy-Corn Maker Ahead of Halloween
Chicago-based Ferrara acknowledged an Oct. 9 attack that encrypted some systems and disrupted production.
- Lisa Vaas
Google Crushes YouTube Cookie-Stealing Channel Hijackers
Google has caught and brushed off a bunch of cookie-stealing YouTube channel hijackers who were running cryptocurrency scams on, or auctioning off, ripped-off channels. 

Archives

Leave a Reply

Your email address will not be published. Required fields are marked *

three − two =