Update 6/29/2021, 9:00 PM: Western Digital has published an update that says the company will provide data recovery services starting early next month. My Book Live customers will also be eligible for a trade-in program so they can upgrade to My Cloud devices. A spokeswoman said the data recovery service will be free of charge.
The company also provided new technical details about the zeroday, which is now being tracked as CVE-2021-35941. Company officials wrote:
We have heard concerns about the nature of this vulnerability and are sharing technical details to address these questions. We have determined that the unauthenticated factory reset vulnerability was introduced to the My Book Live in April of 2011 as part of a refactor of authentication logic in the device firmware. The refactor centralized the authentication logic into a single file, which is present on the device as
includes/component_config.php
and contains the authentication type required by each endpoint. In this refactor, the authentication logic insystem_factory_restore.php
was correctly disabled, but the appropriate authentication type ofADMIN_AUTH_LAN_ALL
was not added tocomponent_config.php
, resulting in the vulnerability. The same refactor removed authentication logic from other files and correctly added the appropriate authentication type to thecomponent_config.php
file.
The post added:
We have reviewed log files which we have received from affected customers to understand and characterize the attack. The log files we reviewed show that the attackers directly connected to the affected My Book Live devices from a variety of IP addresses in different countries. Our investigation shows that in some cases, the same attacker exploited both vulnerabilities on the device, as evidenced by the source IP. The first vulnerability was exploited to install a malicious binary on the device, and the second vulnerability was later exploited to reset the device.
What follows is the article as it originally appeared: