Categories: Cyber Security News

WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution

A serious security vulnerability in Western Digital’s WD Discovery desktop application has been disclosed, potentially allowing attackers to execute arbitrary code on Windows systems.

The flaw, tracked as CVE-2025-30248, affects WD Discovery version 5.2.730 and all prior releases.

The security issue involves a DLL hijacking vulnerability within the WD Discovery installer. This type of attack exploits the way Windows searches for dynamic-link library (DLL) files when applications load.

Local attackers can place a malicious DLL file in the installer’s search path, which the legitimate application then loads and executes, granting the attacker full code execution capabilities on the target system.

Beyond the primary DLL Search Order Hijacking vulnerability, Western Digital also identified additional EXE and DLL hijacking issues specifically within the Tiny Installer component used by WD Discovery.

These multiple attack vectors compound the security risk for users running vulnerable versions. While the vulnerability requires local access to exploit, the consequences are severe.

Successful exploitation allows attackers to execute arbitrary code with the same privileges as the WD Discovery installer, potentially compromising the entire system.

The issue particularly affects organizations where multiple users share workstations or where physical security controls may be weaker.

Western Digital has classified the vulnerability with a CVSS 4.0 score of 8.9 (HIGH severity), reflecting the significant threat it poses to affected systems.

Western Digital released WD Discovery version 5.3 on December 19, 2025, which fully addresses all identified vulnerabilities.

Users will receive automatic update notifications through the application, prompting them to install the security patch.

Alternatively, users can manually download version 5.3 from the official WD Discovery Downloads page.

Western Digital acknowledges Kazuma Matsumoto, a security researcher at GMO Cybersecurity by IERAE, Inc., and David Silva for responsibly disclosing these vulnerabilities through coordinated disclosure processes.

Windows users running any version of WD Discovery before 5.3 should immediately update their installations to mitigate potential exploitation risks.

Follow us on Google News, LinkedIn, and X for daily cybersecurity updates. Contact us to feature your stories.

The post WD Discovery Desktop App for Windows Vulnerability Enables Arbitrary Code Execution appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

UK Politicians Say GTA 6 Developer Rockstar ‘Refused to Properly Engage’ With Appeal Processes After Firing Staff Last Year

UK politicians have strongly criticized GTA 6 developer Rockstar for its firing of 34 workers…

58 minutes ago

The LEGO Star Wars AT-AT Walker Has Hit Its Lowest Price So Far at Amazon

May is quite a big month for LEGO fans. Not only are there a wide…

58 minutes ago

Christopher Nolan Defends The Odyssey From Historical Accuracy Complaints After Some Said Agamemnon Looks Like Batman

Christopher Nolan has defended his upcoming movie, The Odyssey, from complaints about historical accuracy, after…

59 minutes ago

Today’s Top Deals: Metroid Prime 4, LEGO Diagon Alley, Hyrule Warriors: Age of Imprisonment

If you’re looking for recently released games to play on Switch, both Metroid Prime 4:…

59 minutes ago

Marvel’s Midnight Line Reinvents the X-Men, Spider-Man, and Fantastic Four via Horror

Marvel fans are still puzzling over the decision to wrap up the wildly successful Ultimate…

2 hours ago

New Pokémon Deluxe Character Guide Book and Limited Edition Box Set Releasing This August

Pokémon fans, it's time to clear out some space on your bookshelf, as the shiny…

2 hours ago

This website uses cookies.