4.9
CVE-2023-22819
- EPSS 0.15%
- Veröffentlicht 05.02.2024 22:15:55
- Zuletzt bearbeitet 21.11.2024 07:45:28
- Quelle psirt@wdc.com
- Teams Watchlist Login
- Unerledigt Login
An uncontrolled resource consumption vulnerability issue that could arise by sending crafted requests to a service to consume a large amount of memory, eventually resulting in the service being stopped and restarted was discovered in Western Digital My Cloud Home, My Cloud Home Duo, SanDisk ibi and Western Digital My Cloud OS 5 devices. This issue requires the attacker to already have root privileges in order to exploit this vulnerability. This issue affects My Cloud Home and My Cloud Home Duo: before 9.5.1-104; ibi: before 9.5.1-104; My Cloud OS 5: before 5.27.161.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Westerndigital ≫ My Cloud Pr4100 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Ex4100 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Ex2 Ultra Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Mirror G2 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Dl2100 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Dl4100 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Ex2100 Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Glacier Firmware Version < 5.27.161
Westerndigital ≫ Wd Cloud Firmware Version < 5.27.161
Westerndigital ≫ My Cloud Home Firmware Version < 9.5.1-104
Westerndigital ≫ My Cloud Home Duo Firmware Version < 9.5.1-104
Westerndigital ≫ Sandisk Ibi Firmware Version < 9.5.1-104
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.15% | 0.363 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
|
psirt@wdc.com | 4.9 | 1.2 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
|
CWE-400 Uncontrolled Resource Consumption
The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.
CWE-770 Allocation of Resources Without Limits or Throttling
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.