{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-22169","assignerOrgId":"cb3b742e-5145-4748-b44b-5ffd45bf3b6a","state":"PUBLISHED","assignerShortName":"WDC PSIRT","dateReserved":"2024-01-05T18:43:18.488Z","datePublished":"2024-08-02T18:31:11.324Z","dateUpdated":"2024-08-05T18:55:48.270Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"WD Discovery","vendor":"Western Digital","versions":[{"lessThan":"5.0.589","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Western Digital would like to thank YoKo Kho, Fahad Alamri, and AbdulKarim from HakTrak Cybersecurity Squad for reporting this issue"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>WD Discovery\nversions prior to 5.0.589 contain a misconfiguration in the Node.js environment\nsettings that could allow code execution by utilizing the '<span style=\"background-color: var(--wht);\">ELECTRON_RUN_AS_NODE'&nbsp;</span>environment variable.\nAny malicious application operating with standard user permissions can exploit\nthis vulnerability, enabling code execution within WD Discovery application's\ncontext. WD Discovery version 5.0.589 addresses this issue by disabling certain\nfeatures and fuses in Electron.&nbsp;<span style=\"background-color: var(--wht);\">The attack vector for this issue requires the victim to have the WD Discovery app installed on their&nbsp;</span><span style=\"background-color: var(--wht);\">device.</span><span style=\"background-color: var(--wht);\"><br></span>\n\n\n<br></p>"}],"value":"WD Discovery\nversions prior to 5.0.589 contain a misconfiguration in the Node.js environment\nsettings that could allow code execution by utilizing the 'ELECTRON_RUN_AS_NODE' environment variable.\nAny malicious application operating with standard user permissions can exploit\nthis vulnerability, enabling code execution within WD Discovery application's\ncontext. WD Discovery version 5.0.589 addresses this issue by disabling certain\nfeatures and fuses in Electron. The attack vector for this issue requires the victim to have the WD Discovery app installed on their device."}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"PRESENT","attackVector":"LOCAL","baseScore":7.1,"baseSeverity":"HIGH","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"PASSIVE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:P/VC:N/VI:H/VA:N/SC:H/SI:H/SA:H","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"cb3b742e-5145-4748-b44b-5ffd45bf3b6a","shortName":"WDC PSIRT","dateUpdated":"2024-08-02T18:31:11.324Z"},"references":[{"url":"https://www.westerndigital.com/support/product-security/wdc-24004-wd-discovery-desktop-app-version-5-0-589"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Users can\ndownload the latest version from the WD Discovery Downloads page or by\nfollowing the instructions on the <a target=\"_blank\" rel=\"nofollow\" href=\"https://support-en.wd.com/app/answers/detailweb/a_id/20465\">WD Discovery: Online User Guide</a></p>\n\n\n\n\n\n<br>"}],"value":"Users can\ndownload the latest version from the WD Discovery Downloads page or by\nfollowing the instructions on the  WD Discovery: Online User Guide https://support-en.wd.com/app/answers/detailweb/a_id/20465"}],"source":{"discovery":"EXTERNAL"},"title":"Misconfiguration in node.js causing a code execution in WD Discovery","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"affected":[{"vendor":"westerndigital","product":"wd_discovery","cpes":["cpe:2.3:a:westerndigital:wd_discovery:-:*:*:*:*:mac_os:*:*"],"defaultStatus":"unknown","versions":[{"version":"0","status":"affected","lessThan":"5.0.589","versionType":"custom"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-05T18:52:00.824388Z","id":"CVE-2024-22169","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-05T18:55:48.270Z"}}]}}