CVE-2022-29836

Post-Auth Path Traversal Vulnerability Allows to Custom Package Installation via HTTP API

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability was discovered via an HTTP API on Western Digital My Cloud Home; My Cloud Home Duo; and SanDisk ibi devices that could allow an attacker to abuse certain parameters to point to random locations on the file system. This could also allow the attacker to initiate the installation of custom packages at these locations. This can only be exploited once the attacker has been authenticated to the device. This issue affects: Western Digital My Cloud Home and My Cloud Home Duo versions prior to 8.11.0-113 on Linux; SanDisk ibi versions prior to 8.11.0-113 on Linux.

Remediation

Solution:

  • Your My Cloud Home and ibi device will be automatically updated to reflect the latest firmware version.

Category

1.9
CVSS
Severity: Low
CVSS 3.1 •
EPSS 0.10%
Vendor Advisory westerndigital.com
Affected: Western Digital My Cloud Home
Affected: SanDisk ibi
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-29836?
CVE-2022-29836 has been scored as a low severity vulnerability.
How to fix CVE-2022-29836?
To fix CVE-2022-29836: Your My Cloud Home and ibi device will be automatically updated to reflect the latest firmware version.
Is CVE-2022-29836 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-29836 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-29836?
CVE-2022-29836 affects Western Digital My Cloud Home, SanDisk ibi.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.