Those planning to buy Western Digital My Cloud, avoid it.
Those who already have them read this very seriously.
WD has injected their devices with hard-coded backdoor to access your data.
WD devices allow remote backdoor admin access
WD devices allow remote backdoor admin access through the username “mydlinkBRionyg” and password “abc12345cba”.
Source:-
1. https://www.theverge.com/2018/1/11/16877680/western-digital-cloud-devices-vulnerability
2. https://www.csoonline.com/article/3...-12-western-digital-my-cloud-nas-devices.html
Not only this , they sell your private data and tack your usage and browsing pattern. ( they declared it here https://www.wdc.com/about-wd/legal/third-party-analytics.html)
Western Digital's My Cloud is a popular storage/backup device that lets users backup and store important documents, photos and media files. Unfortunately the default configuration of a new My Cloud EX2 drive allows any unauthenticated local network user to grab any files from the device using HTTP requests.
Source:- https://www.trustwave.com/Resources/SpiderLabs-Blog/WD-My-Cloud-EX2-Serves-Your-Files-to-Anyone/
Someone mentioned a workaround to these venerability-
which are too much technical for a normal user, specially who will opt for WD Cloud instead of building their own NAS.
Any Linux expert if care to explain the above steps in details for less technical user would be really appreciated.
EDIT:-
here is the live video to exploit.
Those who already have them read this very seriously.
WD has injected their devices with hard-coded backdoor to access your data.
WD devices allow remote backdoor admin access
WD devices allow remote backdoor admin access through the username “mydlinkBRionyg” and password “abc12345cba”.
Source:-
1. https://www.theverge.com/2018/1/11/16877680/western-digital-cloud-devices-vulnerability
2. https://www.csoonline.com/article/3...-12-western-digital-my-cloud-nas-devices.html
Not only this , they sell your private data and tack your usage and browsing pattern. ( they declared it here https://www.wdc.com/about-wd/legal/third-party-analytics.html)
We currently use Flurry, Crashlytics, Sumo Logic, and Google Analytics to track and report on the usage and browsing patterns on some of our software applications.
For Flurry’s privacy policy, please see https://policies.yahoo.com/us/en/yahoo/privacy/index.htm. You may opt-out of Flurry by following this link: https://dev.flurry.com/secure/optOut.do.
For Crashlytics’s privacy policy, please see http://try.crashlytics.com/terms.
For Google’s privacy policy with respect to Google Analytics, please see http://www.google.com/analytics/learn/privacy.html.
For Sumo Logic’s privacy policy, please see https://www.sumologic.com/privacy-statement/.
Western Digital's My Cloud is a popular storage/backup device that lets users backup and store important documents, photos and media files. Unfortunately the default configuration of a new My Cloud EX2 drive allows any unauthenticated local network user to grab any files from the device using HTTP requests.
Source:- https://www.trustwave.com/Resources/SpiderLabs-Blog/WD-My-Cloud-EX2-Serves-Your-Files-to-Anyone/
Someone mentioned a workaround to these venerability-
Code:
As for how to remove since the OS is based on debian it’s fairly easy.
You can manually stop the services first if you are nervous using.
service nameofservicehere stop
List of services:
apache2
itunes
mDNSResponder
openvpn
wdphotodbmergerd
twonky
smartd
upnp_nas
wdVftEntry
wdmcserverd
Then you can either remove them entirely with dpkg -r servicename
or just disable on startup by using rcconf.
apt-get install rcconf
then disable the services listed above.
Any Linux expert if care to explain the above steps in details for less technical user would be really appreciated.
EDIT:-
here is the live video to exploit.
Last edited: