{"id":23749,"date":"2022-03-22T11:03:52","date_gmt":"2022-03-22T10:03:52","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=23749"},"modified":"2022-03-22T11:05:28","modified_gmt":"2022-03-22T10:05:28","slug":"schwachstelle-cve-2022-22988-in-western-digital-edgerover-desktop-anwendung-ermglicht-admin-rechte-macos-windows","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2022\/03\/22\/schwachstelle-cve-2022-22988-in-western-digital-edgerover-desktop-anwendung-ermglicht-admin-rechte-macos-windows\/","title":{"rendered":"Vulnerability CVE-2022-22988 in Western Digital EdgeRover desktop application allows admin privileges (macOS, Windows)"},"content":{"rendered":"<p><img decoding=\"async\" title=\"Sicherheit (Pexels, allgemeine Nutzung)\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" alt=\"Sicherheit (Pexels, allgemeine Nutzung)\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2021\/04\/Sicherheit_klein.jpg\" width=\"200\" align=\"left\">[<a href=\"https:\/\/www.borncity.com\/blog\/2022\/03\/22\/schwachstelle-cve-2022-22988-in-western-digital-edgerover-desktop-anwendung-ermglicht-admin-rechte-macos-windows\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]I'm posting this briefly here on the blog because people in the readership may be using Western Digital's EdgeRover desktop application on macOS or Windows. The vulnerability CVE-2022-22988 in older versions of the app allows attackers to gain elevated privileges under the operating systems mentioned. The manufacturer has provided an update to close the vulnerability.<\/p>\n<p><!--more--><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"https:\/\/vg02.met.vgwort.de\/na\/822c92df503541ab87d7716e00a6af37\" width=\"1\" height=\"1\">The <a href=\"https:\/\/www.westerndigital.com\/en-us\/support\/software\/edgerover\" target=\"_blank\" rel=\"noopener\">EdgeRover<\/a> desktop app is a centralised management solution for Western Digital and SanDisk products that unifies multiple digital storage devices under a single management interface. The manufacturer states:<\/p>\n<blockquote>\n<p>EdgeRover\u2122 is a new, innovative personal content management app developed by Western Digital, a leading provider of data storage solutions. <\/p>\n<p>The desktop app includes free features. You can create a directory of all digital files stored on your Mac or Windows computer and supported external drives2 and conveniently search, browse and play content.<\/p>\n<\/blockquote>\n<p>The proprietary software solution promises to increase ease of use and convenience. It offers content search, category filtering, allows you to manage access permissions and more. Unfortunately, older versions of the app allow local privilege elevation on macOS and Windows. I came across the issue via the following <a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1505547750758404098\" target=\"_blank\" rel=\"noopener\">tweet<\/a> from Bleeping Computer, among others. The colleagues have covered it <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/western-digital-app-bug-gives-elevated-privileges-in-windows-macos\/\" target=\"_blank\" rel=\"noopener\">here<\/a> in an article.<\/p>\n<p><a href=\"https:\/\/twitter.com\/BleepinComputer\/status\/1505547750758404098\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"Security: Western Digital App EdgeRover\" alt=\"Security: Western Digital App EdgeRover\" src=\"https:\/\/i.imgur.com\/jaoWqNl.png\"><\/a>&nbsp;<\/p>\n<p>Western Digital has published an arguably short <a href=\"https:\/\/www.westerndigital.com\/support\/product-security\/wdc-22004-edgerover-desktop-app-version-1-5-1-594\" target=\"_blank\" rel=\"noopener\">security advisory<\/a> for vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/cve-2022-22988\" target=\"_blank\" rel=\"noopener\">CVE-2022-22988<\/a> as of 18 March 2022. It states that EdgeRover was vulnerable to a directory traversal vulnerability. This allowed an attacker to perform a local privilege escalation and bypass the basic file system sandbox. If successfully exploited, these vulnerabilities could lead to disclosure of confidential information or denial of service. Updates to the app have been available from Western Digital since 10 March 2022 to close the vulnerability.<\/p>\n<ul>\n<li>EdgeRover Mac Desktop App: <a href=\"https:\/\/downloads.mycloud.com\/latest\/mac\/prod\/Install_EdgeRover_for_Mac.dmg\" target=\"_blank\" rel=\"noopener\">1.5.1-594<\/a>\n<li>EdgeRover Windows Desktop App: <a href=\"https:\/\/downloads.mycloud.com\/latest\/windows\/prod\/Install_EdgeRover_for_Windows.exe\" target=\"_blank\" rel=\"noopener\">1.5.1-594<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>[German]I'm posting this briefly here on the blog because people in the readership may be using Western Digital's EdgeRover desktop application on macOS or Windows. The vulnerability CVE-2022-22988 in older versions of the app allows attackers to gain elevated privileges &hellip; <a href=\"https:\/\/borncity.com\/win\/2022\/03\/22\/schwachstelle-cve-2022-22988-in-western-digital-edgerover-desktop-anwendung-ermglicht-admin-rechte-macos-windows\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[923,580,2],"tags":[78,1232,69,194],"class_list":["post-23749","post","type-post","status-publish","format-standard","hentry","category-macos","category-security","category-windows","tag-app","tag-macos","tag-security","tag-windows"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=23749"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/23749\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=23749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=23749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=23749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}