cve/2022/CVE-2022-36330.md

19 lines
1.2 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-36330](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36330)
![](https://img.shields.io/static/v1?label=Product&message=My%20Cloud%20Home%20and%20My%20Cloud%20Home%20Duo&color=blue)
![](https://img.shields.io/static/v1?label=Product&message=ibi&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=0%3C%20%209.4.0-191%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-120%20Buffer%20Copy%20without%20Checking%20Size%20of%20Input%20('Classic%20Buffer%20Overflow')&color=brighgreen)
### Description
A buffer overflow vulnerability was discovered on firmware version validation that could lead to an unauthenticated remote code execution in Western Digital My Cloud Home, My Cloud Home Duo and SanDisk ibi devices. An attacker would require exploitation of another vulnerability to raise their privileges in order to exploit this buffer overflow vulnerability.This issue affects My Cloud Home and My Cloud Home Duo: before 9.4.0-191; ibi: before 9.4.0-191. 
### POC
#### Reference
- https://www.westerndigital.com/support/product-security/wdc-23003-western-digital-my-cloud-home-my-cloud-home-duo-and-sandisk-ibi-firmware-version-9-4-0-191
#### Github
No PoCs found on GitHub currently.