Two severe vulnerabilities found in the Western Digital and SanDisk solid-state drive (SSD) Dashboard could allow attackers to trick users into running arbitrary code on the victim’s computer. The first vulnerability, tracked as CVE-2019-13466, is related to the hard-coded password for protecting the archived customer-generated system and diagnostic reports. Researchers found the vulnerability after dumping strings from the main binary file. One of the strings found was a hardcoded password used for encrypting report information. By exploiting this vulnerability, an attacker could intercept the report and read all sensitive data included in the SSD Dashboard. The second flaw, tracked as CVE-2019-13467, is more severe. This flaw is due to the application using HTTP versus HTTPS for communication with the SanDisk site, which could allow an attacker to create a rogue hotspot and perform a man-in-the-middle (MITM) style attack. A MITM could allow an attacker to deliver malicious content instead of the requested information from the app.
Western Digital has confirmed the issue and recommends that users download the latest version 18.104.22.168.