Categories: Cyber Security News

WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

A serious security vulnerability in Western Digital’s WD Discovery desktop application has been disclosed, potentially allowing attackers to execute arbitrary code on Windows systems.

The flaw, tracked as CVE-2025-30248, affects WD Discovery version 5.2.730 and all prior releases.

The security issue involves a DLL hijacking vulnerability within the WD Discovery installer. This type of attack exploits the way Windows searches for dynamic-link library (DLL) files when applications load.

Local attackers can place a malicious DLL file in the installer’s search path, which the legitimate application then loads and executes, granting the attacker full code execution capabilities on the target system.

Beyond the primary DLL Search Order Hijacking vulnerability, Western Digital also identified additional EXE and DLL hijacking issues specifically within the Tiny Installer component used by WD Discovery.

These multiple attack vectors compound the security risk for users running vulnerable versions. While the vulnerability requires local access to exploit, the consequences are severe.

Successful exploitation allows attackers to execute arbitrary code with the same privileges as the WD Discovery installer, potentially compromising the entire system.

The issue particularly affects organizations where multiple users share workstations or where physical security controls may be weaker.

Western Digital has classified the vulnerability with a CVSS 4.0 score of 8.9 (HIGH severity), reflecting the significant threat it poses to affected systems.

Western Digital released WD Discovery version 5.3 on December 19, 2025, which fully addresses all identified vulnerabilities.

Users will receive automatic update notifications through the application, prompting them to install the security patch.

Alternatively, users can manually download version 5.3 from the official WD Discovery Downloads page.

Western Digital acknowledges Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc., and David Silva for responsibly disclosing these vulnerabilities through coordinated disclosure processes.

Windows users running any version of WD Discovery before 5.3 should immediately update their installations to mitigate potential exploitation risks.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Self-Hosted WYSIWYG Editor in Vanilla JS – Neiki Editor

Neiki Editor is a vanilla JavaScript rich text editor that turns a textarea into a…

18 minutes ago

Vanilla Calendar JS Library for Date Picking, Scheduling, and Timelines

CalendarJS is a feature-rich JavaScript calendar library that allows you to create calendars, date pickers,…

18 minutes ago

Lawmakers hear concerns over data center expansion in Michigan

LANSING, MI (WOWO) A Michigan township official is urging communities to update zoning policies as…

48 minutes ago

Critical Vulnerability In Flowise Allows Remote Command Execution Via MCP Adapters

A critical vulnerability in Flowise and multiple AI frameworks has been discovered by OX Security,…

48 minutes ago

Vercel Confirms Data Breach — Hackers Claim Access to Internal Systems

Vercel has disclosed a significant security incident after threat actors gained unauthorized access to internal…

48 minutes ago

New toll road plan links rate hikes to stadium-related funding

HAMMOND, IND. (WOWO) Indiana officials have approved a lease amendment that will allow more frequent…

57 minutes ago

This website uses cookies.