LG NAS Devices Vulnerability
A vulnerability in the LG network-attached storage (NAS) device allows a remote attacker access by using command injection on the password parameter login page, without authentication.
This content has been archived
This article no longer conforms to NHS Digital's standards for cyber alerts, and may contain outdated or inaccurate information. Use of this information contained in this page is at your own risk
Summary
A vulnerability in the LG network-attached storage (NAS) device allows a remote attacker access by using command injection on the password parameter login page, without authentication.
Threat details
The attacker can exploit this vulnerability to execute arbitrary commands which includes adding a new user account and download the database containing existing usernames and MD5 hashed passwords. After creating the new user account, the attacker can freely login to the administration interface and access any file stored on the device.
Remediation steps
Last edited: 17 February 2020 12:47 pm