Locked out? Don’t worry, here’s the hardcoded password for your WD My Cloud NAS device

Yes, it works remotely.

Locked out? Don't worry, here's the hardcoded password for your WD My Cloud NAS device

Security researcher James Bercegay found a glaring security hole in the Western Digital MyCloud family of storage devices back in June 2017.

He discovered that, amongst other vulnerabilities, a hidden firmware backdoor allowed anyone to login remotely, using the username mydlinkBRionyg, and the somewhat underwhelming password abc12345cba.

Which is really rather handy I have to admit, especially if you’re the kind of person who finds remembering passwords a right royal pain in the backside and want to access your personal stored files while you’re away from home.

What isn’t quite so marvellous is that, sadly, someone might use the same credentials (and yes, they are apparently the same on all affected WD devices) to log into your personal files remotely. In fact, the existence of default login credentials could even be used in a Mirai-style attack.

The following Western Digital devices are said to be vulnerable:

  • My Cloud
  • My Cloud Mirror
  • My Cloud Gen 2
  • My Cloud PR2100
  • My Cloud PR4100
  • My Cloud EX2 Ultra
  • My Cloud EX2
  • My Cloud EX4
  • My Cloud EX2100
  • My Cloud EX4100
  • My Cloud DL2100
  • My Cloud DL4100

Like any good vulnerability researcher, Bercegay informed the vendor about the problem, and Western Digital requested that he wait 90 days before publicly disclosing the flaw, giving them time to fix it.

Unfortunately, after six months, Western Digital still hadn’t issued any fixes. So, now we all know about it.

And that seems to have - finally - stirred Western Digital into action. Customers are advised to install firmware version 2.30.174 to remove the bonkers backdoor.

Regular readers will note that this isn’t the first time that WD My Cloud devices have been found to contain concerning vulnerabilities.

Tags: , , ,

Share this article:

   Join thousands of others and sign up to our free "GCHQ" newsletter.

Smashing Security podcast
Check out "Smashing Security", the award-winning weekly audio podcast, with Graham Cluley, Carole Theriault, and special guests from the world of information security.

"It's brilliant!" • "Three people having fun in an industry often focused on bad news" • Winner of the Best Security Podcast 2018

Latest episodes:
Listen on Apple Podcasts Listen on Google Podcasts

, , ,

8 Responses

  1. A

    January 9, 2018 at 8:10 pm #

    https://blog.westerndigital.com/western-digital-cloud-update/ stats that fix is in 2.30.172 not 2.30.174

    • Graham Cluley in reply to A.

      January 10, 2018 at 12:53 am #

      Hmm. That’s odd. Bercegay in his disclosure says that the fix is to update to firmware version 2.30.174. Maybe WD fixed it in 2.30.172, but they had got to 2.30.174 by the time of Bercegay’s advisory? It’s a mystery…

      Anyway, WD My Cloud users - update to the latest version, whatever that is.

  2. Etaoin Shrdlu

    January 9, 2018 at 11:35 pm #

    and won’t to access your personal stored files”

  3. Chris

    January 10, 2018 at 4:10 pm #

    Updating my Mycloud as we speak but it says latest version is

  4. furriephillips

    January 12, 2018 at 1:28 pm #

    They’re not the only culprits for this kind of underhand and short-sighted practice. These IP cameras have definitely got a hard-coded user:pass that is not documented or user-manageable. http://amzn.to/2Dpeym3

    • furriephillips in reply to furriephillips.

      January 12, 2018 at 1:29 pm #

      And it’s on their uncloseable telnet port! *eyeroll*

  5. DeeeeLink

    April 8, 2019 at 10:29 pm #

    Note the ‘D-Link’ connection… D-Link SUCK at security, in my (limited) experience…

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.