CVE-2022-29835

WD Discovery software executable files were signed with an unsafe SHA-1 hashing algorithm. An attacker could use this weakness to create forged certificate signatures due to the use of a hashing algorithm that is not collision-free. This could thereby impact the confidentiality of user content. This issue affects: Western Digital WD Discovery WD Discovery Desktop App versions prior to 4.4.396 on Mac; WD Discovery Desktop App versions prior to 4.4.396 on Windows.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:macos:*:*
cpe:2.3:a:westerndigital:wd_discovery:*:*:*:*:*:windows:*:*

History

21 Nov 2024, 06:59

Type Values Removed Values Added
References () https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396 - Vendor Advisory () https://www.westerndigital.com/support/product-security/wdc-22014-wd-discovery-desktop-app-version-4-4-396 - Vendor Advisory

21 Jul 2023, 16:55

Type Values Removed Values Added
CWE CWE-327 CWE-326

Information

Published : 2022-09-19 20:15

Updated : 2024-11-21 06:59


NVD link : CVE-2022-29835

Mitre link : CVE-2022-29835

CVE.ORG link : CVE-2022-29835


JSON object : View

Products Affected

westerndigital

  • wd_discovery
CWE
CWE-328

Use of Weak Hash

CWE-326

Inadequate Encryption Strength