CVE-2022-22995

Western Digital My Cloud OS 5 and My Cloud Home Unauthenticated Arbitrary File Write Vulnerability in Netatalk

Description

The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.

Remediation

Solution:

  • To take advantage of the latest security fixes, Western Digital recommends that users promptly update their devices to the latest firmware by clicking on the firmware update notification.

Category

10.0
CVSS
Severity: Critical
CVSS 3.1 •
CVSS 2.0 •
EPSS 0.14%
Vendor Advisory fedoraproject.org Vendor Advisory fedoraproject.org Vendor Advisory gentoo.org Vendor Advisory fedoraproject.org Vendor Advisory westerndigital.com
Affected: Western Digital My Cloud
Affected: Western Digital My Cloud Home
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-22995?
CVE-2022-22995 has been scored as a critical severity vulnerability.
How to fix CVE-2022-22995?
To fix CVE-2022-22995: To take advantage of the latest security fixes, Western Digital recommends that users promptly update their devices to the latest firmware by clicking on the firmware update notification.
Is CVE-2022-22995 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-22995 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-22995?
CVE-2022-22995 affects Western Digital My Cloud, Western Digital My Cloud Home.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.