Lance, can I suggest that it might be an idea for WD to post a sticky thread on the relevant sub-forums, identifying the status of disclosed CVEs, their exploit risk, and suggested mitigations, and in what firmware CVE vulnerabilities have been closed.
At the moment, all we have to go on is vague statements in the firmware release notes, which rarely identify specific CVEs.
If WD take product security seriously, they REALLY ought to know the status of EVERY reported CVE relevant to their products.
The impression most forum users have gained over the last few years is that, sadly, WD do not take product security seriously; I really shouldn’t have to be telling WD how to communicate product security status to your customers, it should be glaringly obvious.
I just wanted to update you all on this issue. We have released a new FW available today for manual download and installation. It will be available for pushed OTA FW update next week. Please see the post below.
Also regarding the hardcoded admin user and password. This issue was resolved in 11/17 FW 2.30.172 release.
Lance. I’m assuming you know that a list of users from the MyCloud NASs can still be dumped without any need for authentication? Luckily, no passwords revealed, but the admin account name is revealed!
I turned off the cloud access and I am not able to use the MyCloud app on my mobile device when I am in my local network at home. Is it right? Any chance using the Mycloud app?
One CAN use the My Cloud apps (and Desktop software) if one disabled Remote Access/Cloud Access within the My Cloud Dashboard. However, depending on how one initially configured the My Cloud app/software for access (for example using one’s MyCloud.com login) one may need to remove the existing device from the app/software and select the local networked My Cloud device. Obviously one will need to be on the same local network as the My Cloud in order for the app/software to find the local networked My Cloud device.