Getty Photos
Western Electronic has set a bug in its computer software that allowed attackers to obtain limited documents.
The security flaw lay in EdgeRover, which is a proprietary WD file explorer app, and has an effect on each the Mac and Windows version of the application.
Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
Equally variations of the product or service put up with from a directory traversal vulnerability. An attacker can elevate their local privileges and escape fundamental file-method sandboxing, mentioned the business in an advisory.
“These vulnerabilities when effectively exploited could direct to disclosure of delicate facts or denial-of-service,” the firm said.
Western Electronic registered the bug as CVE-2022-22988. It has a vulnerability score of 9.1 and is rated as critical.
Even though the bug could allow for entry to limited data files, an attacker would need to have to have by now compromised the equipment to exploit this bug.
The company fixed the flaw by modifying file and directory permissions, restricting the folders that files can be loaded from. Customers really should upgrade to variation 1.5.1.594 of the application on Mac and Windows equipment to deal with the issue.
EdgeRover lets people today to develop an stock and snapshots of all the documents saved on their laptop or computer and external drives. The product or service allows users research across all their files, like media that isn’t really presently connected. The lookup ability also includes previews of photos and documents.
EdgeRover has experienced from security bugs right before. In December 2021, Western Electronic documented two vulnerabilities in Mac and Windows versions of the application. The bugs, which lay in its OpenSSL library, permitted a denial of assistance attack and a remote code execution attack on the system. The company set individuals by updating its OpenSSL library.
Yet another bug in the Windows edition, set last May possibly, allowed end users to elevate privileges and load malicious information into restricted directories. That bug lay in the company’s implementation of Node.js.
Some elements of this post are sourced from:
www.itpro.co.uk