Page 1
Page 1
Started By
Message

Western Digital 'My Cloud' devices have a hardcoded backdoor

Posted on 1/9/18 at 10:17 am
Posted by TigerinATL
Member since Feb 2005
62437 posts
Posted on 1/9/18 at 10:17 am
quote:

many Western Digital My Cloud NAS drives have a hardcoded backdoor, meaning anyone can access them -- your files could be at risk. It isn't even hard to take advantage of it -- the username is "mydlinkBRionyg" and the password is "abc12345cba" (without quotes).

...Bercegay further explains, "The triviality of exploiting this issues makes it very dangerous, and even wormable. Not only that, but users locked to a LAN are not safe either. An attacker could literally take over your WDMyCloud by just having you visit a website where an embedded iframe or img tag make a request to the vulnerable device using one of the many predictable default hostnames for the WDMyCloud such as 'wdmycloud' and 'wdmycloudmirror' etc."

LINK /

This was a pretty big hole but the article is over the top alarmist in tone, basically the fix is to update the firmware.

quote:

Apparently, firmware 2.30.172 (issued November 2017) fixes the bug, so do not reconnect to the internet until you are sure that your device is updated and the vulnerability is patched.
Posted by Korkstand
Member since Nov 2003
29000 posts
Posted on 1/9/18 at 11:13 am to
quote:

the article is over the top alarmist in tone
I don't think so, this sort of thing is all too common. How many huge security issues have to come to light before companies start caring?
Posted by jcole4lsu
The Kwisatz Haderach
Member since Nov 2007
31005 posts
Posted on 1/9/18 at 11:14 am to
so
much
money
to
be
made

Posted by TigerinATL
Member since Feb 2005
62437 posts
Posted on 1/9/18 at 11:26 am to
quote:

I don't think so, this sort of thing is all too common


He's saying stop using the device immediately on something that has a patch out. It's click bait.

quote:

How many huge security issues have to come to light before companies start caring?


When customers start caring. Bad press that is quickly forgotten is about the only consequence these companies face. Even then it's usually just in the tech section and most people don't see it. This is the board where it belongs, but to actually inform the masses that have these devices this probably needs to be posted to the OT and Rant.
This post was edited on 1/9/18 at 11:28 am
Posted by Korkstand
Member since Nov 2003
29000 posts
Posted on 1/9/18 at 11:57 am to
quote:

He's saying stop using the device immediately on something that has a patch out.
He means take it offline, which I think is sound advice.
quote:

It's click bait.
"Click bait" that spreads important news isn't a bad thing IMO. Would you prefer if the title was "Backdoor found in NAS devices"? What percentage of users would read it?
quote:

When customers start caring. Bad press that is quickly forgotten is about the only consequence these companies face.
Then I think we need more "click bait" articles.
quote:

Even then it's usually just in the tech section and most people don't see it. This is the board where it belongs, but to actually inform the masses that have these devices this probably needs to be posted to the OT and Rant.
Well, most of us have quite a few people that ask for recs on things, and I for one will be hesitant to recommend WD products in the future.
Posted by transcend
Austin, TX
Member since Aug 2013
4166 posts
Posted on 1/9/18 at 12:13 pm to
The original tech write up about all the exploits in the code includes a nice link you can send your buddies that uses a XSS attack to delete their whole NAS with a single click... also some nice google hacks can pull up hundreds of these things exposed to the public for you to go to town on
first pageprev pagePage 1 of 1Next pagelast page
refresh

Back to top
logoFollow TigerDroppings for LSU Football News
Follow us on X, Facebook and Instagram to get the latest updates on LSU Football and Recruiting.

FacebookXInstagram