- Description
- Instances of UniFi Network Application that (i) are run on a UniFi Gateway Console, and (ii) are versions 7.5.176. and earlier, implement device adoption with improper access control logic, creating a risk of access to device configuration information by a malicious actor with preexisting access to the network. Affected Products: UDM UDM-PRO UDM-SE UDR UDW Mitigation: Update UniFi Network to Version 7.5.187 or later.
- Source
- support@hackerone.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 3.0
- Type
- Secondary
- Base score
- 10
- Impact score
- 6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
- Severity
- CRITICAL
- nvd@nist.gov
- NVD-CWE-noinfo
- 134c704f-9b21-4f2e-91b3-4a467353bcc0
- CWE-284
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ui:unifi_network_application:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9E3DE617-CF3A-415A-A504-5735D8FF35E5",
"versionEndIncluding": "7.5.176"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ui:unifi_dream_machine:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "33E04DDA-88A0-47C1-8AE2-2F59B1A08BAF"
},
{
"criteria": "cpe:2.3:h:ui:unifi_dream_machine_pro:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B493983E-8632-4492-9B0A-E8E11E0E0BB2"
},
{
"criteria": "cpe:2.3:h:ui:unifi_dream_machine_special_edition:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "DEF52155-86F1-458A-8B7E-355B67C5C819"
},
{
"criteria": "cpe:2.3:h:ui:unifi_dream_router:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "B1FF6A5E-A223-4F57-9FFD-F2AE473B3627"
},
{
"criteria": "cpe:2.3:h:ui:unifi_dream_wall:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A9B6514E-2878-4AEE-BF1E-08B804C069FE"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]