Search criteria
9 vulnerabilities found for unifi_switch_firmware by ui
FKIE_CVE-2023-35085
Vulnerability from fkie_nvd - Published: 2023-08-10 19:15 - Updated: 2024-11-21 08:07
Severity ?
Summary
An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.50 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update the UniFi Switches to Version 6.5.59 or later.
References
| URL | Tags | ||
|---|---|---|---|
| support@hackerone.com | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ui | unifi_uap_firmware | * | |
| ui | u6\+ | - | |
| ui | u6-enterprise | - | |
| ui | u6-enterprise-iw | - | |
| ui | u6-extender | - | |
| ui | u6-iw | - | |
| ui | u6-lite | - | |
| ui | u6-lr | - | |
| ui | u6-mesh | - | |
| ui | u6-pro | - | |
| ui | uap-ac-iw | - | |
| ui | uap-ac-lite | - | |
| ui | uap-ac-lr | - | |
| ui | uap-ac-m | - | |
| ui | uap-ac-m-pro | - | |
| ui | uap-ac-pro | - | |
| ui | ubb | - | |
| ui | ubb-xg | - | |
| ui | uwb-xg | - | |
| ui | unifi_switch_firmware | * | |
| ui | us-16-150w | - | |
| ui | us-24-250w | - | |
| ui | us-48-500w | - | |
| ui | us-8-150w | - | |
| ui | us-8-60w | - | |
| ui | us-xg-6poe | - | |
| ui | usw-16-poe | - | |
| ui | usw-24 | - | |
| ui | usw-24-poe | - | |
| ui | usw-48 | - | |
| ui | usw-48-poe | - | |
| ui | usw-aggregation | - | |
| ui | usw-enterprise-24-poe | - | |
| ui | usw-enterprise-48-poe | - | |
| ui | usw-enterprise-8-poe | - | |
| ui | usw-enterprisexg-24 | - | |
| ui | usw-flex | - | |
| ui | usw-flex-xg | - | |
| ui | usw-industrial | - | |
| ui | usw-lite-16-poe | - | |
| ui | usw-lite-8-poe | - | |
| ui | usw-mission-critical | - | |
| ui | usw-pro-24 | - | |
| ui | usw-pro-24-poe | - | |
| ui | usw-pro-48 | - | |
| ui | usw-pro-48-poe | - | |
| ui | usw-pro-aggregation | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:unifi_uap_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E2686D1-9EC2-4C0A-BA4E-B28F57B054C8",
"versionEndIncluding": "6.5.50",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ui:u6\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2CE9DEA-F0FD-4A8E-98AB-36F87C40F1F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-enterprise:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1020447C-93FA-42D6-BA01-D1AE08B25C2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-enterprise-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76254C68-9B4A-4235-8E33-57258EDD5AA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-extender:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CDC687A-C0E1-4F77-AA16-963BE9CDBC3C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2640C955-4707-4C41-821D-C5A6167B2856",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D6010F-39B5-4035-BCFA-3EC40BFED5CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573BC349-D7EA-4F64-83C3-A0402D8D8AD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-mesh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5986D778-24F3-4972-92FC-AAF2ECF8FAFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F230AF7-CF0B-4F3A-A536-D25DB9DA52E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D055A30-7260-4548-A53E-A494FEE18E7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C591F57C-0162-4B8F-BA1A-AAA154065D4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F7A9AF-67ED-4AB0-86CB-B6386566CB6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B27159DB-E6FC-494F-B5E1-C2C6B5EC1FCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-m-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB265A14-6E1F-498B-9D0E-DE91F1155C69",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46FD9619-1620-41ED-9B2F-14DBD468744F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:ubb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6480788-66E3-496A-B1D8-4A190E5D2222",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:ubb-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F840F091-FA53-4F41-9DDE-F00C0C377EC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uwb-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E8DBA7-B43B-4EA7-A8AC-AC50AA4714F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08AC707B-15BA-4E28-9986-372DE2389074",
"versionEndIncluding": "6.5.32",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ui:us-16-150w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD780EAB-CA86-4CC7-9D80-63AC898422D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-24-250w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE87B72-7316-4CA9-BC9B-0CA62D48D82E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-48-500w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45AFD894-70FC-4E9A-B4C4-E3785C4A3479",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-8-150w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D3F7DA-B5A1-4AE9-9E29-468618F7EF50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-8-60w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F043681-EE08-4D84-9C04-DF38526261E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-xg-6poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E973806-9CF3-4FFD-8F11-EB269802C8FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-16-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0546CAF-C129-4851-8F11-643210ED412F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AEC37C-535D-4D91-A5E7-E5279A633019",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C462A08D-BDFA-48B4-BEAF-08CEB150B059",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD64A71-56FF-4085-AF6C-15EA0F6E8378",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685D1F65-83D4-4B17-B32E-7ACE6DC5369A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-aggregation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6125A5E-9951-4563-990A-4E650CDC9B98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724A3C35-8CCF-4A20-A007-9BDF95940892",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "418FFCA4-3818-4F4D-85F6-1458380D459F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-8-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0A4E44-97FB-4B58-8032-B37B2841C053",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprisexg-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44744D4A-C95F-4404-941E-58C8F2FD215E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-flex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8380E3AB-B7CA-4383-A69B-A9035975C6C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-flex-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "140D2FF7-F27D-4DE5-A282-D7C142A767FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-industrial:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF462DED-B7F7-48F4-BB0D-07CD0F967CC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-lite-16-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C81323E8-B673-4583-8D95-54305AA0BF22",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-lite-8-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6FF084-A010-42D8-B825-3B9148EBF20D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-mission-critical:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BC9784-AFE7-4D26-AC04-43F81400D839",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84A4E1C5-D11A-42A4-A7E5-E155BF12D7E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C14A48-3695-425E-9E3E-FD6C9025564F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "318EA276-9F4D-4963-AE6B-A73EC6239C29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AB243A-FAF3-487C-AAAC-9B5895736EAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-aggregation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F5CCEF-45DC-4EF6-83AB-FCFE60BFFF4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).\n\n \n\nAffected Products:\nAll UniFi Access Points (Version 6.5.50 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate the UniFi Switches to Version 6.5.59 or later."
}
],
"id": "CVE-2023-35085",
"lastModified": "2024-11-21T08:07:56.790",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.2,
"impactScore": 6.0,
"source": "support@hackerone.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-10T19:15:09.730",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-190"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2023-38034
Vulnerability from fkie_nvd - Published: 2023-08-10 19:15 - Updated: 2024-11-21 08:12
Severity ?
Summary
A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.53 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update UniFi Switches to Version 6.5.59 or later.
References
| URL | Tags | ||
|---|---|---|---|
| support@hackerone.com | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ui | unifi_uap_firmware | * | |
| ui | u6\+ | - | |
| ui | u6-enterprise | - | |
| ui | u6-enterprise-iw | - | |
| ui | u6-extender | - | |
| ui | u6-iw | - | |
| ui | u6-lite | - | |
| ui | u6-lr | - | |
| ui | u6-mesh | - | |
| ui | u6-pro | - | |
| ui | uap-ac-iw | - | |
| ui | uap-ac-lite | - | |
| ui | uap-ac-lr | - | |
| ui | uap-ac-m | - | |
| ui | uap-ac-m-pro | - | |
| ui | uap-ac-pro | - | |
| ui | ubb | - | |
| ui | ubb-xg | - | |
| ui | uwb-xg | - | |
| ui | unifi_switch_firmware | * | |
| ui | us-16-150w | - | |
| ui | us-24-250w | - | |
| ui | us-48-500w | - | |
| ui | us-8-150w | - | |
| ui | us-8-60w | - | |
| ui | us-xg-6poe | - | |
| ui | usw-16-poe | - | |
| ui | usw-24 | - | |
| ui | usw-24-poe | - | |
| ui | usw-48 | - | |
| ui | usw-48-poe | - | |
| ui | usw-aggregation | - | |
| ui | usw-enterprise-24-poe | - | |
| ui | usw-enterprise-48-poe | - | |
| ui | usw-enterprise-8-poe | - | |
| ui | usw-enterprisexg-24 | - | |
| ui | usw-flex | - | |
| ui | usw-flex-xg | - | |
| ui | usw-industrial | - | |
| ui | usw-lite-16-poe | - | |
| ui | usw-lite-8-poe | - | |
| ui | usw-mission-critical | - | |
| ui | usw-pro-24 | - | |
| ui | usw-pro-24-poe | - | |
| ui | usw-pro-48 | - | |
| ui | usw-pro-48-poe | - | |
| ui | usw-pro-aggregation | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:unifi_uap_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4AEF57B-2155-4BEA-89F5-037E34C4E507",
"versionEndIncluding": "6.5.53",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ui:u6\\+:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2CE9DEA-F0FD-4A8E-98AB-36F87C40F1F5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-enterprise:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1020447C-93FA-42D6-BA01-D1AE08B25C2D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-enterprise-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "76254C68-9B4A-4235-8E33-57258EDD5AA0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-extender:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CDC687A-C0E1-4F77-AA16-963BE9CDBC3C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2640C955-4707-4C41-821D-C5A6167B2856",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F8D6010F-39B5-4035-BCFA-3EC40BFED5CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "573BC349-D7EA-4F64-83C3-A0402D8D8AD1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-mesh:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5986D778-24F3-4972-92FC-AAF2ECF8FAFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:u6-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3F230AF7-CF0B-4F3A-A536-D25DB9DA52E0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-iw:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D055A30-7260-4548-A53E-A494FEE18E7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-lite:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C591F57C-0162-4B8F-BA1A-AAA154065D4B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-lr:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6F7A9AF-67ED-4AB0-86CB-B6386566CB6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B27159DB-E6FC-494F-B5E1-C2C6B5EC1FCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-m-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FB265A14-6E1F-498B-9D0E-DE91F1155C69",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uap-ac-pro:-:*:*:*:*:*:*:*",
"matchCriteriaId": "46FD9619-1620-41ED-9B2F-14DBD468744F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:ubb:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E6480788-66E3-496A-B1D8-4A190E5D2222",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:ubb-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F840F091-FA53-4F41-9DDE-F00C0C377EC5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:uwb-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "10E8DBA7-B43B-4EA7-A8AC-AC50AA4714F6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "08AC707B-15BA-4E28-9986-372DE2389074",
"versionEndIncluding": "6.5.32",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ui:us-16-150w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD780EAB-CA86-4CC7-9D80-63AC898422D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-24-250w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3EE87B72-7316-4CA9-BC9B-0CA62D48D82E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-48-500w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "45AFD894-70FC-4E9A-B4C4-E3785C4A3479",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-8-150w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4D3F7DA-B5A1-4AE9-9E29-468618F7EF50",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-8-60w:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5F043681-EE08-4D84-9C04-DF38526261E7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:us-xg-6poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E973806-9CF3-4FFD-8F11-EB269802C8FB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-16-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0546CAF-C129-4851-8F11-643210ED412F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A4AEC37C-535D-4D91-A5E7-E5279A633019",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C462A08D-BDFA-48B4-BEAF-08CEB150B059",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3FD64A71-56FF-4085-AF6C-15EA0F6E8378",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "685D1F65-83D4-4B17-B32E-7ACE6DC5369A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-aggregation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F6125A5E-9951-4563-990A-4E650CDC9B98",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "724A3C35-8CCF-4A20-A007-9BDF95940892",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "418FFCA4-3818-4F4D-85F6-1458380D459F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprise-8-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0A4E44-97FB-4B58-8032-B37B2841C053",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-enterprisexg-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44744D4A-C95F-4404-941E-58C8F2FD215E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-flex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8380E3AB-B7CA-4383-A69B-A9035975C6C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-flex-xg:-:*:*:*:*:*:*:*",
"matchCriteriaId": "140D2FF7-F27D-4DE5-A282-D7C142A767FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-industrial:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BF462DED-B7F7-48F4-BB0D-07CD0F967CC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-lite-16-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C81323E8-B673-4583-8D95-54305AA0BF22",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-lite-8-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6FF084-A010-42D8-B825-3B9148EBF20D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-mission-critical:-:*:*:*:*:*:*:*",
"matchCriteriaId": "20BC9784-AFE7-4D26-AC04-43F81400D839",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "84A4E1C5-D11A-42A4-A7E5-E155BF12D7E9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-24-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05C14A48-3695-425E-9E3E-FD6C9025564F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-48:-:*:*:*:*:*:*:*",
"matchCriteriaId": "318EA276-9F4D-4963-AE6B-A73EC6239C29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-48-poe:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B7AB243A-FAF3-487C-AAAC-9B5895736EAB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:ui:usw-pro-aggregation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "85F5CCEF-45DC-4EF6-83AB-FCFE60BFFF4D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).\n\n \nAffected Products:\nAll UniFi Access Points (Version 6.5.53 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate UniFi Switches to Version 6.5.59 or later."
}
],
"id": "CVE-2023-38034",
"lastModified": "2024-11-21T08:12:43.107",
"metrics": {
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 1.6,
"impactScore": 6.0,
"source": "support@hackerone.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-08-10T19:15:09.803",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-77"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-44527
Vulnerability from fkie_nvd - Published: 2021-12-07 14:15 - Updated: 2024-11-21 06:31
Severity ?
Summary
A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ui | unifi_switch_firmware | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9AB82776-C025-46C1-9230-4092E404F337",
"versionEndExcluding": "5.76.6",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later."
},
{
"lang": "es",
"value": "Una vulnerabilidad encontrada en el firmware de UniFi Switch versi\u00f3n 5.43.35 y anteriores, permite a un actor malicioso que ya ha obtenido acceso a la red llevar a cabo un ataque de denegaci\u00f3n de servicio (DoS) en el switch afectado. Esta vulnerabilidad se ha corregido en el firmware de UniFi Switch versiones 5.76.6 y posteriores"
}
],
"id": "CVE-2021-44527",
"lastModified": "2024-11-21T06:31:09.933",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-07T14:15:09.847",
"references": [
{
"source": "support@hackerone.com",
"tags": [
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
],
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "support@hackerone.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-400"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2023-35085 (GCVE-0-2023-35085)
Vulnerability from cvelistv5 – Published: 2023-08-10 18:58 – Updated: 2024-12-04 16:30
VLAI?
Summary
An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.50 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update the UniFi Switches to Version 6.5.59 or later.
Severity ?
9 (Critical)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Points |
Affected:
6.5.50 , ≤ 6.5.50
(semver)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:23:58.703Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35085",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T19:35:23.464052Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T16:30:50.323Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Points",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.50",
"status": "affected",
"version": "6.5.50",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Switches",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.32",
"status": "affected",
"version": "6.5.32",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).\n\n \n\nAffected Products:\nAll UniFi Access Points (Version 6.5.50 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate the UniFi Switches to Version 6.5.59 or later."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-08-10T18:58:17.222Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-35085",
"datePublished": "2023-08-10T18:58:17.222Z",
"dateReserved": "2023-06-13T01:00:11.784Z",
"dateUpdated": "2024-12-04T16:30:50.323Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-38034 (GCVE-0-2023-38034)
Vulnerability from cvelistv5 – Published: 2023-08-10 18:58 – Updated: 2024-12-04 16:30
VLAI?
Summary
A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.53 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update UniFi Switches to Version 6.5.59 or later.
Severity ?
8.3 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Points |
Affected:
6.5.53 , ≤ 6.5.53
(semver)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:30:12.339Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-38034",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T19:39:04.848268Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T16:30:27.937Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Points",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.53",
"status": "affected",
"version": "6.5.53",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Switches",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.32",
"status": "affected",
"version": "6.5.32",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).\n\n \nAffected Products:\nAll UniFi Access Points (Version 6.5.53 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate UniFi Switches to Version 6.5.59 or later."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-08-10T18:58:07.647Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-38034",
"datePublished": "2023-08-10T18:58:07.647Z",
"dateReserved": "2023-07-12T01:00:11.880Z",
"dateUpdated": "2024-12-04T16:30:27.937Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-44527 (GCVE-0-2021-44527)
Vulnerability from cvelistv5 – Published: 2021-12-07 13:12 – Updated: 2024-08-04 04:25
VLAI?
Summary
A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later.
Severity ?
No CVSS data available.
CWE
- CWE-400 - Denial of Service (CWE-400)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | UniFi Switches |
Affected:
Fixed in 5.76.6
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:25:16.471Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UniFi Switches",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in 5.76.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "Denial of Service (CWE-400)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-07T13:12:26",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2021-44527",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "UniFi Switches",
"version": {
"version_data": [
{
"version_value": "Fixed in 5.76.6"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (CWE-400)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb",
"refsource": "MISC",
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2021-44527",
"datePublished": "2021-12-07T13:12:26",
"dateReserved": "2021-12-02T00:00:00",
"dateUpdated": "2024-08-04T04:25:16.471Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-35085 (GCVE-0-2023-35085)
Vulnerability from nvd – Published: 2023-08-10 18:58 – Updated: 2024-12-04 16:30
VLAI?
Summary
An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.50 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update the UniFi Switches to Version 6.5.59 or later.
Severity ?
9 (Critical)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Points |
Affected:
6.5.50 , ≤ 6.5.50
(semver)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:23:58.703Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35085",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T19:35:23.464052Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T16:30:50.323Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Points",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.50",
"status": "affected",
"version": "6.5.50",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Switches",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.32",
"status": "affected",
"version": "6.5.32",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).\n\n \n\nAffected Products:\nAll UniFi Access Points (Version 6.5.50 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate the UniFi Switches to Version 6.5.59 or later."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-08-10T18:58:17.222Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-35085",
"datePublished": "2023-08-10T18:58:17.222Z",
"dateReserved": "2023-06-13T01:00:11.784Z",
"dateUpdated": "2024-12-04T16:30:50.323Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-38034 (GCVE-0-2023-38034)
Vulnerability from nvd – Published: 2023-08-10 18:58 – Updated: 2024-12-04 16:30
VLAI?
Summary
A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.53 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update UniFi Switches to Version 6.5.59 or later.
Severity ?
8.3 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Points |
Affected:
6.5.53 , ≤ 6.5.53
(semver)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:30:12.339Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-38034",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-09T19:39:04.848268Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T16:30:27.937Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Points",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.53",
"status": "affected",
"version": "6.5.53",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Switches",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThanOrEqual": "6.5.32",
"status": "affected",
"version": "6.5.32",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).\n\n \nAffected Products:\nAll UniFi Access Points (Version 6.5.53 and earlier)\nAll UniFi Switches (Version 6.5.32 and earlier) \n-USW Flex Mini excluded.\n \n\nMitigation:\nUpdate UniFi Access Points to Version 6.5.62 or later.\nUpdate UniFi Switches to Version 6.5.59 or later."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
}
}
],
"providerMetadata": {
"dateUpdated": "2023-08-10T18:58:07.647Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2023-38034",
"datePublished": "2023-08-10T18:58:07.647Z",
"dateReserved": "2023-07-12T01:00:11.880Z",
"dateUpdated": "2024-12-04T16:30:27.937Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-44527 (GCVE-0-2021-44527)
Vulnerability from nvd – Published: 2021-12-07 13:12 – Updated: 2024-08-04 04:25
VLAI?
Summary
A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later.
Severity ?
No CVSS data available.
CWE
- CWE-400 - Denial of Service (CWE-400)
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | UniFi Switches |
Affected:
Fixed in 5.76.6
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:25:16.471Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "UniFi Switches",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in 5.76.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "Denial of Service (CWE-400)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-12-07T13:12:26",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "support@hackerone.com",
"ID": "CVE-2021-44527",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "UniFi Switches",
"version": {
"version_data": [
{
"version_value": "Fixed in 5.76.6"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability found in UniFi Switch firmware Version 5.43.35 and earlier allows a malicious actor who has already gained access to the network to perform a Deny of Service (DoS) attack on the affected switch.This vulnerability is fixed in UniFi Switch firmware 5.76.6 and later."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Denial of Service (CWE-400)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb",
"refsource": "MISC",
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-022-022/cd83c01b-33e4-454a-b3b9-1c3ccebea7cb"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2021-44527",
"datePublished": "2021-12-07T13:12:26",
"dateReserved": "2021-12-02T00:00:00",
"dateUpdated": "2024-08-04T04:25:16.471Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}