4.9

CVE-2023-22819

An uncontrolled resource consumption vulnerability issue that could arise by sending crafted requests to a service to consume a large amount of memory, eventually resulting in the service being stopped and restarted was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires the attacker to already have root privileges in order to exploit this vulnerability. This issue affects My Cloud Home and My Cloud Home Duo: before 9.5.1-104; ibi: before 9.5.1-104; My Cloud OS 5: before 5.27.161.

Data is provided by the National Vulnerability Database (NVD)
WesterndigitalMy Cloud Pr4100 Firmware Version < 5.27.161
   WesterndigitalMy Cloud Pr4100 Version-
WesterndigitalMy Cloud Ex4100 Firmware Version < 5.27.161
   WesterndigitalMy Cloud Ex4100 Version-
WesterndigitalMy Cloud Dl2100 Firmware Version < 5.27.161
   WesterndigitalMy Cloud Dl2100 Version-
WesterndigitalMy Cloud Dl4100 Firmware Version < 5.27.161
   WesterndigitalMy Cloud Dl4100 Version-
WesterndigitalMy Cloud Ex2100 Firmware Version < 5.27.161
   WesterndigitalMy Cloud Ex2100 Version-
WesterndigitalMy Cloud Glacier Firmware Version < 5.27.161
   WesterndigitalMy Cloud Glacier Version-
WesterndigitalWd Cloud Firmware Version < 5.27.161
   WesterndigitalWd Cloud Version-
WesterndigitalMy Cloud Home Firmware Version < 9.5.1-104
   WesterndigitalMy Cloud Home Version-
WesterndigitalSandisk Ibi Firmware Version < 9.5.1-104
   WesterndigitalSandisk Ibi Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.15% 0.363
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
psirt@wdc.com 4.9 1.2 3.6
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.