GHSA-PR73-55XW-CPWC

Vulnerability from github – Published: 2025-08-05 00:30 – Updated: 2025-08-05 15:30
VLAI?
Details

An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.

Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier)

Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later

Show details on source website

{
  "affected": [],
  "aliases": [
    "CVE-2025-27212"
  ],
  "database_specific": {
    "cwe_ids": [
      "CWE-20"
    ],
    "github_reviewed": false,
    "github_reviewed_at": null,
    "nvd_published_at": "2025-08-04T23:15:27Z",
    "severity": "CRITICAL"
  },
  "details": "An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.\n\n \n\nAffected Products:\nUniFi Access Reader Pro (Version 2.14.21 and earlier)\nUniFi Access G2 Reader Pro (Version 1.10.32 and earlier)\nUniFi Access G3 Reader Pro (Version 1.10.30 and earlier)\nUniFi Access Intercom (Version 1.7.28 and earlier)\nUniFi Access G3 Intercom (Version 1.7.29 and earlier)\nUniFi Access Intercom Viewer (Version 1.3.20 and earlier)\n\n \n\nMitigation:\nUpdate UniFi Access Reader Pro Version 2.15.9 or later\nUpdate UniFi Access G2 Reader Pro Version 1.11.23 or later\nUpdate UniFi Access G3 Reader Pro Version 1.11.22 or later\nUpdate UniFi Access Intercom Version 1.8.22 or later\nUpdate UniFi Access G3 Intercom Version 1.8.22 or later\nUpdate UniFi Access Intercom Viewer Version 1.4.39 or later",
  "id": "GHSA-pr73-55xw-cpwc",
  "modified": "2025-08-05T15:30:45Z",
  "published": "2025-08-05T00:30:26Z",
  "references": [
    {
      "type": "ADVISORY",
      "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-27212"
    },
    {
      "type": "WEB",
      "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-051-051/583fa6e1-3d85-42ec-a453-651d1653c9b3"
    }
  ],
  "schema_version": "1.4.0",
  "severity": [
    {
      "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
      "type": "CVSS_V3"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…