Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

Posted on January 27, 2026January 27, 2026 By CWS

A severe safety vulnerability in Western Digital’s WD Discovery desktop utility has been disclosed, probably permitting attackers to execute arbitrary code on Home windows methods.

The flaw, tracked as CVE-2025-30248, impacts WD Discovery model 5.2.730 and all prior releases.

The safety problem entails a DLL hijacking vulnerability inside the WD Discovery installer. Such a assault exploits the best way Home windows searches for dynamic-link library (DLL) information when purposes load.

Native attackers can place a malicious DLL file within the installer’s search path, which the reliable utility then hundreds and executes, granting the attacker full code execution capabilities on the goal system.

Past the first DLL Search Order Hijacking vulnerability, Western Digital additionally recognized extra EXE and DLL hijacking points particularly inside the Tiny Installer element utilized by WD Discovery.

These a number of assault vectors compound the safety danger for customers operating susceptible variations. Whereas the vulnerability requires native entry to take advantage of, the results are extreme.

Profitable exploitation permits attackers to execute arbitrary code with the identical privileges because the WD Discovery installer, probably compromising the whole system.

The difficulty significantly impacts organizations the place a number of customers share workstations or the place bodily safety controls could also be weaker.

Western Digital has categorised the vulnerability with a CVSS 4.0 rating of 8.9 (HIGH severity), reflecting the numerous menace it poses to affected methods.

Western Digital launched WD Discovery model 5.3 on December 19, 2025, which absolutely addresses all recognized vulnerabilities.

Customers will obtain computerized replace notifications by way of the applying, prompting them to put in the safety patch.

Alternatively, customers can manually obtain model 5.3 from the official WD Discovery Downloads web page.

Western Digital acknowledges Kazuma Matsumoto, a safety researcher at GMO Cybersecurity by IERAE, Inc., and David Silva for responsibly disclosing these vulnerabilities by way of coordinated disclosure processes.

Home windows customers operating any model of WD Discovery earlier than 5.3 ought to instantly replace their installations to mitigate potential exploitation dangers.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:App, Arbitrary, Code, Desktop, Discovery, Enables, Execution, Vulnerability, Windows

Post navigation

Previous Post: Caminho Loader-as-a-Service Using Steganography to Conceal .NET Payloads within Image Files
Next Post: CISA releases Secure Connectivity Principles Checklist for Operational Technology Networks Connectivity

Related Posts

London Councils’ IT Systems Impacted by CyberAttack, Including Phone Lines Cyber Security News
Senator Calls for FTC Investigation into Microsoft’s Use of Outdated RC4 Encryption and Kerberoasting Vulnerabilities Cyber Security News
Mandiant Releases Rainbow Tables Enabling NTLMv1 Admin Password Hacking Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
New Phishing Attack Abusing Blob URLs to Bypass SEGs and Evade Analysis Cyber Security News
Threat Actors Attacking Organizations Key Employees With Weaponized Copyright Documents to Deliver Noodlophile Stealer Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
  • ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Attackers Exploiting React2Shell Vulnerability to Attack IT Sectors
  • Memcyco Raises $37 Million for Anti-Impersonation Technology
  • Over 100 Organizations Targeted in ShinyHunters Phishing Campaign
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services
  • ‘PackageGate’ Flaws Open JavaScript Ecosystem to Supply Chain Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark