CVE-2022-23006

Buffer Overflow Vulnerability in Western Digital My Cloud Home Products and SanDisk ibi

Description

A stack-based buffer overflow vulnerability was found on Western Digital My Cloud Home, My Cloud Home Duo, and SanDisk ibi that could allow an attacker accessing the system locally to read information from /etc/version file. This vulnerability can only be exploited by chaining it with another issue. If an attacker is able to carry out a remote code execution attack, they can gain access to the vulnerable file, due to the presence of insecure functions in code. User interaction is required for exploitation. Exploiting the vulnerability could result in exposure of information, ability to modify files, memory access errors, or system crashes.

Remediation

Solution:

  • Your device will be automatically updated to the latest firmware version.

Categories

1.8
CVSS
Severity: Low
CVSS 3.1 •
EPSS 0.27%
Vendor Advisory westerndigital.com
Affected: Western Digital My Cloud Home
Affected: Western Digital My Cloud Home Duo
Affected: SanDisk ibi
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-23006?
CVE-2022-23006 has been scored as a low severity vulnerability.
How to fix CVE-2022-23006?
To fix CVE-2022-23006: Your device will be automatically updated to the latest firmware version.
Is CVE-2022-23006 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-23006 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-23006?
CVE-2022-23006 affects Western Digital My Cloud Home, Western Digital My Cloud Home Duo, SanDisk ibi.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.