CVE-2024-22054 (GCVE-0-2024-22054)
Vulnerability from cvelistv5 – Published: 2024-02-20 17:14 – Updated: 2025-03-27 20:55
VLAI?
Summary
A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.
Affected Products:
UniFi Access Points
UniFi Switches
UniFi LTE Backup
UniFi Express (Only Mesh Mode, Router mode is not affected)
Mitigation:
Update UniFi Access Points to Version 6.6.55 or later.
Update UniFi Switches to Version 6.6.61 or later.
Update UniFi LTE Backup to Version 6.6.57 or later.
Update UniFi Express to Version 3.2.5 or later.
Severity ?
7.5 (High)
CWE
- CWE-20 - Improper Input Validation
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Points |
Affected:
6.6.55 , < 6.6.55
(semver)
|
|||||||||||||||||
|
|||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.831Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:ubiquiti:unifi_uap_firmware:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "unifi_uap_firmware",
"vendor": "ubiquiti",
"versions": [
{
"lessThan": "6.6.55",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-22054",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-02-21T20:40:11.727545Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-27T20:55:19.431Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Points",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "6.6.55",
"status": "affected",
"version": "6.6.55",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Switches",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "6.6.61",
"status": "affected",
"version": "6.6.61",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi LTE Backup",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "6.6.57",
"status": "affected",
"version": "6.6.57",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Express ",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "3.2.5",
"status": "affected",
"version": "3.2.5",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\n\n\nAffected Products:\nUniFi Access Points\nUniFi Switches\nUniFi LTE Backup\nUniFi Express (Only Mesh Mode, Router mode is not affected)\n\n \nMitigation:\nUpdate UniFi Access Points to Version 6.6.55 or later.\nUpdate UniFi Switches to Version 6.6.61 or later.\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\nUpdate UniFi Express to Version 3.2.5 or later."
}
],
"providerMetadata": {
"dateUpdated": "2024-03-04T01:39:11.208Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2024-22054",
"datePublished": "2024-02-20T17:14:34.212Z",
"dateReserved": "2024-01-05T01:04:06.642Z",
"dateUpdated": "2025-03-27T20:55:19.431Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\\n\\n\\nAffected Products:\\nUniFi Access Points\\nUniFi Switches\\nUniFi LTE Backup\\nUniFi Express (Only Mesh Mode, Router mode is not affected)\\n\\n \\nMitigation:\\nUpdate UniFi Access Points to Version 6.6.55 or later.\\nUpdate UniFi Switches to Version 6.6.61 or later.\\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\\nUpdate UniFi Express to Version 3.2.5 or later.\"}, {\"lang\": \"es\", \"value\": \"Un paquete de descubrimiento con formato incorrecto enviado por un actor malintencionado con acceso preexistente a la red podr\\u00eda interrumpir la funcionalidad de administraci\\u00f3n y descubrimiento de dispositivos. Productos afectados: Puntos de acceso UniFi Conmutadores UniFi Copia de seguridad UniFi LTE UniFi Express (solo el modo malla, el modo enrutador no se ve afectado) Mitigaci\\u00f3n: actualice los puntos de acceso UniFi a la versi\\u00f3n 6.6.65 o posterior. Actualice UniFi Switches a la versi\\u00f3n 6.6.61 o posterior. Actualice UniFi LTE Backup a la versi\\u00f3n 6.6.57 o posterior. Actualice UniFi Express a la versi\\u00f3n 3.2.5 o posterior.\"}]",
"id": "CVE-2024-22054",
"lastModified": "2024-11-21T08:55:28.447",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-02-20T18:15:51.393",
"references": "[{\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\", \"source\": \"support@hackerone.com\"}, {\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "support@hackerone.com",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-22054\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2024-02-20T18:15:51.393\",\"lastModified\":\"2025-03-27T21:15:44.933\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\\n\\n\\nAffected Products:\\nUniFi Access Points\\nUniFi Switches\\nUniFi LTE Backup\\nUniFi Express (Only Mesh Mode, Router mode is not affected)\\n\\n \\nMitigation:\\nUpdate UniFi Access Points to Version 6.6.55 or later.\\nUpdate UniFi Switches to Version 6.6.61 or later.\\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\\nUpdate UniFi Express to Version 3.2.5 or later.\"},{\"lang\":\"es\",\"value\":\"Un paquete de descubrimiento con formato incorrecto enviado por un actor malintencionado con acceso preexistente a la red podr\u00eda interrumpir la funcionalidad de administraci\u00f3n y descubrimiento de dispositivos. Productos afectados: Puntos de acceso UniFi Conmutadores UniFi Copia de seguridad UniFi LTE UniFi Express (solo el modo malla, el modo enrutador no se ve afectado) Mitigaci\u00f3n: actualice los puntos de acceso UniFi a la versi\u00f3n 6.6.65 o posterior. Actualice UniFi Switches a la versi\u00f3n 6.6.61 o posterior. Actualice UniFi LTE Backup a la versi\u00f3n 6.6.57 o posterior. Actualice UniFi Express a la versi\u00f3n 3.2.5 o posterior.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"references\":[{\"url\":\"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\",\"source\":\"support@hackerone.com\"},{\"url\":\"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:35:34.831Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-22054\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-02-21T20:40:11.727545Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:ubiquiti:unifi_uap_firmware:*:*:*:*:*:*:*:*\"], \"vendor\": \"ubiquiti\", \"product\": \"unifi_uap_firmware\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"6.6.55\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-08-15T17:41:19.628Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access Points\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6.55\", \"lessThan\": \"6.6.55\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Switches\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6.61\", \"lessThan\": \"6.6.61\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi LTE Backup\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6.57\", \"lessThan\": \"6.6.57\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Express \", \"versions\": [{\"status\": \"affected\", \"version\": \"3.2.5\", \"lessThan\": \"3.2.5\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-037-037/9aeeccef-ca4a-4f10-9f66-1eb400b3d027\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A malformed discovery packet sent by a malicious actor with preexisting access to the network could interrupt the functionality of device management and discovery.\\n\\n\\nAffected Products:\\nUniFi Access Points\\nUniFi Switches\\nUniFi LTE Backup\\nUniFi Express (Only Mesh Mode, Router mode is not affected)\\n\\n \\nMitigation:\\nUpdate UniFi Access Points to Version 6.6.55 or later.\\nUpdate UniFi Switches to Version 6.6.61 or later.\\nUpdate UniFi LTE Backup to Version 6.6.57 or later.\\nUpdate UniFi Express to Version 3.2.5 or later.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2024-03-04T01:39:11.208Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-22054\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-27T20:55:19.431Z\", \"dateReserved\": \"2024-01-05T01:04:06.642Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2024-02-20T17:14:34.212Z\", \"assignerShortName\": \"hackerone\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…