Sunday, May 4, 2025
HomeCyber Security News2 Million Network Storage Devices From WD, SeaGate, NetGear Affected by Unpatched...

2 Million Network Storage Devices From WD, SeaGate, NetGear Affected by Unpatched Zero-Day Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

Critical vulnerabilities discovered in various NAS Devices such as WD My Book, NetGear Stora, Seagate Home, Medion LifeCloud NAS allows attackers to exploit it remotely without any user interaction.

Network Storage Systems (NAS) devices are very essential for small and Medium Business and it helps to increase the storage when you’re running out of the disk space.

New research conducted by security researchers Paulos Yibelo and Daniel Eshetu on leading NAS devices and find some of the critical vulnerabilities.

- Advertisement - Google News

These Vulnerabilities could allow attackers to exploit the devices remotely without any user interaction and gain the highest privileges on the vulnerable system.

There are 2 (dubbed CVE-2018-18472 & CVE-2018-18471) critical Zero-day vulnerabilities addressed in this researcher that affected following 4 four popular NAS devices

  1. WD My Book,
  2. NetGear Stora
  3. Seagate Home
  4. Medion LifeCloud NAS

These Vulnerabilities allows hackers are skilled experts to gain the some of the sensitive privileges such as read files, add/remove users, add/modify existing data, or execute commands on all the above devices.

All four NAS devices tested suffer from a zero-day unauthenticated root remote command execution (preauth RCE) vulnerabilities and there are nearly 2 million affected devices online.

Researchers believe that there are many other NAS devices that suffer from similar vulnerabilities as there seems to be a missing pattern of expected from NAS devices.

XXE and Unauthenticated Remote Command Execution in Axentra Hipserv NAS firmware

Axentra Hipserv is a NAS based operating system that provides cloud-based login access and file storage that is used in different product vendors such as Netgear Stora, Seagate GoFlex Home, Medion LifeCloud.

In this case, the company provides a firmware with a web interface that mainly uses PHP as a serverside language. The web interface has a REST API endpoint and a typical web management interface with a file manager support.

According to wizcase, A vulnerability discovered in this web interface opened the endpoint to exploitation that allows to read files and perform SSRF attacks and you can read the technical details here.

WD MyBook Live Unauthenticated Remote Command Execution

WD MyCloud contains a remotely exploitable Vulnerability in WD MyBook Live that allows Unauthenticated Remote Command Execution.

It allows let attackers run commands on the device as root that vulnerability exists in the language change and modify functionality in the REST API.

Researchers advise all the users from following the steps to prevent from these vulnerabilities.

  • If you are using one of the above devices and they are connected on the WAN, make sure to remove your device from the internet. (Make sure they are running only locally in the safe network)
  • Make sure to contact the affected vendors and insist they release a patch as soon possible.

Also Read:

EE’s 4G WiFi Modem Privilege Escalation Vulnerability Allows Let Attacker Bypass & Gain Windows Access

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...

MintsLoader Malware Uses Sandbox and Virtual Machine Evasion Techniques

MintsLoader, a malicious loader first observed in 2024, has emerged as a formidable tool...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Claude AI Abused in Influence-as-a-Service Operations and Campaigns

Claude AI, developed by Anthropic, has been exploited by malicious actors in a range...

Threat Actors Attacking U.S. Citizens Via Social Engineering Attack

As Tax Day on April 15 approaches, a alarming cybersecurity threat has emerged targeting...

TerraStealer Strikes: Browser Credential & Sensitive‑Data Heists on the Rise

Insikt Group has uncovered two new malware families, TerraStealerV2 and TerraLogger, attributed to the...