Western Digital My Cloud DLNA Vulnerability

A vulnerability has been identified in Western Digital’s MyCloud devices which allows unauthenticated local users full access to the device’s contents.

The vulnerability lies in the UPnP (Universal Plug ‘n’ Play) server which is enabled by default on all MyCloud devices. Using HTTP requests, an attacker can bypass any permissions, authentication or restrictions set by administrators.

Trustwave say Western Digital declined to fix this insecure default setting. Instead they recommend that users turn off DLNA if they do not wish to utilise the product feature.

In the advisory the Trustwave SpiderLabs researcher, Martin Rakhmanov, also provides a tool to test devices which can be found here.

Affected Platforms

  • Various WD My Cloud Devices


  • MyCloud shared folders that contain sensitive data are password protected and encrypted.
  • Media Serving is disabled for shared folders containing sensitive data or disable Twonky DLNA Media Server for the entire MyCloud.

Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: