Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

Posted on January 27, 2026January 27, 2026 By CWS

A severe safety vulnerability in Western Digital’s WD Discovery desktop utility has been disclosed, probably permitting attackers to execute arbitrary code on Home windows methods.

The flaw, tracked as CVE-2025-30248, impacts WD Discovery model 5.2.730 and all prior releases.

The safety problem entails a DLL hijacking vulnerability inside the WD Discovery installer. Such a assault exploits the best way Home windows searches for dynamic-link library (DLL) information when purposes load.

Native attackers can place a malicious DLL file within the installer’s search path, which the reliable utility then hundreds and executes, granting the attacker full code execution capabilities on the goal system.

Past the first DLL Search Order Hijacking vulnerability, Western Digital additionally recognized extra EXE and DLL hijacking points particularly inside the Tiny Installer element utilized by WD Discovery.

These a number of assault vectors compound the safety danger for customers operating susceptible variations. Whereas the vulnerability requires native entry to take advantage of, the results are extreme.

Profitable exploitation permits attackers to execute arbitrary code with the identical privileges because the WD Discovery installer, probably compromising the whole system.

The difficulty significantly impacts organizations the place a number of customers share workstations or the place bodily safety controls could also be weaker.

Western Digital has categorised the vulnerability with a CVSS 4.0 rating of 8.9 (HIGH severity), reflecting the numerous menace it poses to affected methods.

Western Digital launched WD Discovery model 5.3 on December 19, 2025, which absolutely addresses all recognized vulnerabilities.

Customers will obtain computerized replace notifications by way of the applying, prompting them to put in the safety patch.

Alternatively, customers can manually obtain model 5.3 from the official WD Discovery Downloads web page.

Western Digital acknowledges Kazuma Matsumoto, a safety researcher at GMO Cybersecurity by IERAE, Inc., and David Silva for responsibly disclosing these vulnerabilities by way of coordinated disclosure processes.

Home windows customers operating any model of WD Discovery earlier than 5.3 ought to instantly replace their installations to mitigate potential exploitation dangers.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Arbitrary, Code, Desktop, Discovery, Enables, Execution, Vulnerability, Windows

Post navigation

Previous Post: Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files
Next Post: CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity

Related Posts

Best Network Security Providers for Healthcare Cyber Security News
Fortinet FortiWeb Instances Hacked with Webshells Following Public PoC Exploits Cyber Security News
North Korean Hackers Using Fake Zoom Invites to Attack Crypto Startups Cyber Security News
Microsoft Confirms Laying Off 9,000 Employees, Impacting 4% of its Workforce Cyber Security News
WhatsApp Desktop Users At Risk of Code Execution Attacks with Python on Windows PCs Cyber Security News
PgAdmin Vulnerability Lets Attackers Gain Unauthorised Account Access Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Hijacking Official GitHub Desktop Repository to Distribute Malware as Official Installer
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Your Tier 1 Analyst at SOC Team Is Failing at Effective Triage

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark