CVE-2025-27212 (GCVE-0-2025-27212)

Vulnerability from cvelistv5 – Published: 2025-08-04 22:12 – Updated: 2025-08-05 13:33
VLAI?
Summary
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier) Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later
CWE
  • CWE-20 - Improper Input Validation
  • CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2025-27212",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-08-05T13:29:55.643740Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          },
          {
            "descriptions": [
              {
                "cweId": "CWE-77",
                "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-08-05T13:33:09.184Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access Reader Pro",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "2.15.9",
              "status": "affected",
              "version": "2.15.9",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access G2 Reader Pro",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "1.11.23",
              "status": "affected",
              "version": "1.11.23",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access G3 Reader Pro",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "1.11.22",
              "status": "affected",
              "version": "1.11.22",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access Intercom",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "1.8.22",
              "status": "affected",
              "version": "1.8.22",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access G3 Intercom",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "1.8.22",
              "status": "affected",
              "version": "1.8.22",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access Intercom Viewer",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThan": "1.4.39",
              "status": "affected",
              "version": "1.4.39",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.\r\n\r\n \r\n\r\nAffected Products:\r\nUniFi Access Reader Pro (Version 2.14.21 and earlier)\r\nUniFi Access G2 Reader Pro (Version 1.10.32 and earlier)\r\nUniFi Access G3 Reader Pro (Version 1.10.30 and earlier)\r\nUniFi Access Intercom (Version 1.7.28 and earlier)\r\nUniFi Access G3 Intercom (Version 1.7.29 and earlier)\r\nUniFi Access Intercom Viewer (Version 1.3.20 and earlier)\r\n\r\n \r\n\r\nMitigation:\r\nUpdate UniFi Access Reader Pro Version 2.15.9 or later\r\nUpdate UniFi Access G2 Reader Pro Version 1.11.23 or later\r\nUpdate UniFi Access G3 Reader Pro Version 1.11.22 or later\r\nUpdate UniFi Access Intercom Version 1.8.22 or later\r\nUpdate UniFi Access G3 Intercom Version 1.8.22 or later\r\nUpdate UniFi Access Intercom Viewer Version 1.4.39 or later"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-08-04T22:12:18.820Z",
        "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
        "shortName": "hackerone"
      },
      "references": [
        {
          "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-051-051/583fa6e1-3d85-42ec-a453-651d1653c9b3"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
    "assignerShortName": "hackerone",
    "cveId": "CVE-2025-27212",
    "datePublished": "2025-08-04T22:12:18.820Z",
    "dateReserved": "2025-02-20T01:00:01.799Z",
    "dateUpdated": "2025-08-05T13:33:09.184Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-27212\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2025-08-04T23:15:27.963\",\"lastModified\":\"2025-08-05T14:34:17.327\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.\\r\\n\\r\\n \\r\\n\\r\\nAffected Products:\\r\\nUniFi Access Reader Pro (Version 2.14.21 and earlier)\\r\\nUniFi Access G2 Reader Pro (Version 1.10.32 and earlier)\\r\\nUniFi Access G3 Reader Pro (Version 1.10.30 and earlier)\\r\\nUniFi Access Intercom (Version 1.7.28 and earlier)\\r\\nUniFi Access G3 Intercom (Version 1.7.29 and earlier)\\r\\nUniFi Access Intercom Viewer (Version 1.3.20 and earlier)\\r\\n\\r\\n \\r\\n\\r\\nMitigation:\\r\\nUpdate UniFi Access Reader Pro Version 2.15.9 or later\\r\\nUpdate UniFi Access G2 Reader Pro Version 1.11.23 or later\\r\\nUpdate UniFi Access G3 Reader Pro Version 1.11.22 or later\\r\\nUpdate UniFi Access Intercom Version 1.8.22 or later\\r\\nUpdate UniFi Access G3 Intercom Version 1.8.22 or later\\r\\nUpdate UniFi Access Intercom Viewer Version 1.4.39 or later\"},{\"lang\":\"es\",\"value\":\"Una validaci\u00f3n de entrada incorrecta en ciertos dispositivos UniFi Access podr\u00eda permitir una inyecci\u00f3n de comandos por parte de un actor malicioso con acceso a la red de administraci\u00f3n de UniFi Access. Productos afectados: UniFi Access Reader Pro (versi\u00f3n 2.14.21 y anteriores) UniFi Access G2 Reader Pro (versi\u00f3n 1.10.32 y anteriores) UniFi Access G3 Reader Pro (versi\u00f3n 1.10.30 y anteriores) UniFi Access Intercom (versi\u00f3n 1.7.28 y anteriores) UniFi Access G3 Intercom (versi\u00f3n 1.7.29 y anteriores) UniFi Access Intercom Viewer (versi\u00f3n 1.3.20 y anteriores) Mitigaci\u00f3n: Actualizar UniFi Access Reader Pro versi\u00f3n 2.15.9 o posterior Actualizar UniFi Access G2 Reader Pro versi\u00f3n 1.11.23 o posterior Actualizar UniFi Access G3 Reader Pro versi\u00f3n 1.11.22 o posterior Actualizar UniFi Access Intercom versi\u00f3n 1.8.22 o posterior Actualizar UniFi Access G3 Intercom versi\u00f3n 1.8.22 o posterior Actualizar UniFi Access Intercom Viewer versi\u00f3n 1.4.39 o posterior\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"},{\"lang\":\"en\",\"value\":\"CWE-77\"}]}],\"references\":[{\"url\":\"https://community.ui.com/releases/Security-Advisory-Bulletin-051-051/583fa6e1-3d85-42ec-a453-651d1653c9b3\",\"source\":\"support@hackerone.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"cna\": {\"affected\": [{\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access Reader Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.15.9\", \"lessThan\": \"2.15.9\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access G2 Reader Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.11.23\", \"lessThan\": \"1.11.23\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access G3 Reader Pro\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.11.22\", \"lessThan\": \"1.11.22\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access Intercom\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.8.22\", \"lessThan\": \"1.8.22\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access G3 Intercom\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.8.22\", \"lessThan\": \"1.8.22\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access Intercom Viewer\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.4.39\", \"lessThan\": \"1.4.39\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-051-051/583fa6e1-3d85-42ec-a453-651d1653c9b3\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.\\r\\n\\r\\n \\r\\n\\r\\nAffected Products:\\r\\nUniFi Access Reader Pro (Version 2.14.21 and earlier)\\r\\nUniFi Access G2 Reader Pro (Version 1.10.32 and earlier)\\r\\nUniFi Access G3 Reader Pro (Version 1.10.30 and earlier)\\r\\nUniFi Access Intercom (Version 1.7.28 and earlier)\\r\\nUniFi Access G3 Intercom (Version 1.7.29 and earlier)\\r\\nUniFi Access Intercom Viewer (Version 1.3.20 and earlier)\\r\\n\\r\\n \\r\\n\\r\\nMitigation:\\r\\nUpdate UniFi Access Reader Pro Version 2.15.9 or later\\r\\nUpdate UniFi Access G2 Reader Pro Version 1.11.23 or later\\r\\nUpdate UniFi Access G3 Reader Pro Version 1.11.22 or later\\r\\nUpdate UniFi Access Intercom Version 1.8.22 or later\\r\\nUpdate UniFi Access G3 Intercom Version 1.8.22 or later\\r\\nUpdate UniFi Access Intercom Viewer Version 1.4.39 or later\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2025-08-04T22:12:18.820Z\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-27212\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-05T13:29:55.643740Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-20\", \"description\": \"CWE-20 Improper Input Validation\"}]}, {\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-77\", \"description\": \"CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)\"}]}], \"providerMetadata\": {\"shortName\": \"CISA-ADP\", \"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"dateUpdated\": \"2025-08-05T13:31:44.119Z\"}}]}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-27212\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-04T22:12:18.820Z\", \"dateReserved\": \"2025-02-20T01:00:01.799Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2025-08-04T22:12:18.820Z\", \"assignerShortName\": \"hackerone\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…