### [CVE-2019-10706](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10706) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Western Digital SanDisk SanDisk X300, X300s, X400, and X600 devices: The firmware update authentication method relies on a symmetric HMAC digest. The key used to validate this digest is present in a protected area of the device, and if extracted could be used to install arbitrary firmware to other devices. ### POC #### Reference - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd - https://www.westerndigital.com/support/productsecurity/wdc-19006-sandisk-x600-sata-ssd - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd - https://www.westerndigital.com/support/productsecurity/wdc-19007-sandisk-x300-x400-sata-ssd #### Github No PoCs found on GitHub currently.