Western Digital WesternDigitalSSDDashboardSetup.exe prior 3.0.2.0 DLL uncontrolled search path
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.4 | $0-$5k | 0.00 |
Summary
A vulnerability has been found in Western Digital WesternDigitalSSDDashboardSetup.exe and classified as critical. The impacted element is an unknown function of the file WesternDigitalSSDDashboardSetup.exe of the component DLL Handler. The manipulation leads to uncontrolled search path. This vulnerability is uniquely identified as CVE-2020-8959. Local access is required to approach this attack. No exploit exists. The affected component should be upgraded.
Details
A vulnerability was found in Western Digital WesternDigitalSSDDashboardSetup.exe (Forum Software) and classified as critical. This issue affects an unknown part of the file WesternDigitalSSDDashboardSetup.exe of the component DLL Handler. The manipulation with an unknown input leads to a uncontrolled search path vulnerability. Using CWE to declare the problem leads to CWE-427. The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. Impacted is confidentiality, integrity, and availability. The summary by CVE is:
Western Digital WesternDigitalSSDDashboardSetup.exe before 3.0.2.0 allows DLL Hijacking.
The weakness was disclosed 02/19/2020. The identification of this vulnerability is CVE-2020-8959 since 02/12/2020. An attack has to be approached locally. No form of authentication is needed for a successful exploitation. It demands that the victim is doing some kind of user interaction. Technical details are known, but no exploit is available. MITRE ATT&CK project uses the attack technique T1574 for this issue.
Upgrading to version 3.0.2.0 eliminates this vulnerability.
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.5VulDB Meta Temp Score: 6.4
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.8
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Uncontrolled search pathCWE: CWE-427 / CWE-426
CAPEC: 🔍
ATT&CK: 🔍
Physical: Partially
Local: Yes
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: WesternDigitalSSDDashboardSetup.exe 3.0.2.0
Timeline
02/12/2020 🔍02/19/2020 🔍
02/20/2020 🔍
05/12/2025 🔍
Sources
Advisory: support.wdc.comStatus: Confirmed
CVE: CVE-2020-8959 (🔍)
GCVE (CVE): GCVE-0-2020-8959
GCVE (VulDB): GCVE-100-150377
Entry
Created: 02/20/2020 17:38Updated: 05/12/2025 14:41
Changes: 02/20/2020 17:38 (37), 02/20/2020 17:40 (18), 04/02/2024 06:29 (18), 05/12/2025 14:41 (5)
Complete: 🔍
Cache ID: 216:A1D:103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.