Vulnerability CVE-2022-22988 in Western Digital EdgeRover desktop application allows admin privileges (macOS, Windows)

Sicherheit (Pexels, allgemeine Nutzung)[German]I'm posting this briefly here on the blog because people in the readership may be using Western Digital's EdgeRover desktop application on macOS or Windows. The vulnerability CVE-2022-22988 in older versions of the app allows attackers to gain elevated privileges under the operating systems mentioned. The manufacturer has provided an update to close the vulnerability.


The EdgeRover desktop app is a centralised management solution for Western Digital and SanDisk products that unifies multiple digital storage devices under a single management interface. The manufacturer states:

EdgeRover™ is a new, innovative personal content management app developed by Western Digital, a leading provider of data storage solutions.

The desktop app includes free features. You can create a directory of all digital files stored on your Mac or Windows computer and supported external drives2 and conveniently search, browse and play content.

The proprietary software solution promises to increase ease of use and convenience. It offers content search, category filtering, allows you to manage access permissions and more. Unfortunately, older versions of the app allow local privilege elevation on macOS and Windows. I came across the issue via the following tweet from Bleeping Computer, among others. The colleagues have covered it here in an article.

Security: Western Digital App EdgeRover 

Western Digital has published an arguably short security advisory for vulnerability CVE-2022-22988 as of 18 March 2022. It states that EdgeRover was vulnerable to a directory traversal vulnerability. This allowed an attacker to perform a local privilege escalation and bypass the basic file system sandbox. If successfully exploited, these vulnerabilities could lead to disclosure of confidential information or denial of service. Updates to the app have been available from Western Digital since 10 March 2022 to close the vulnerability.

Cookies helps to fund this blog: Cookie settings

This entry was posted in macOS, Security, Windows and tagged , , , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *