Vulnerabilities > UI

DATE CVE VULNERABILITY TITLE RISK
2020-11-05 CVE-2020-8267 Improper Authentication vulnerability in UI Unifi Protect Firmware
A security issue was found in UniFi Protect controller v1.14.10 and earlier.The authentication in the UniFi Protect controller API was using “x-token” improperly, allowing attackers to use the API to send authenticated messages without a valid token.This vulnerability was fixed in UniFi Protect v1.14.11 and newer.This issue does not impact UniFi Cloud Key Gen 2 plus.This issue does not impact UDM-Pro customers with UniFi Protect stopped.Affected Products:UDM-Pro firmware 1.7.2 and earlier.UNVR firmware 1.3.12 and earlier.Mitigation:Update UniFi Protect to v1.14.11 or newer version; the UniFi Protect controller can be updated through your UniFi OS settings.Alternatively, you can update UNVR and UDM-Pro to:- UNVR firmware to 1.3.15 or newer.- UDM-Pro firmware to 1.8.0 or newer.
network
low complexity
ui CWE-287
5.3
2020-10-27 CVE-2020-27888 Insufficiently Protected Credentials vulnerability in UI products
An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices.
network
low complexity
ui CWE-522
7.5
2020-08-21 CVE-2020-8234 Insufficient Session Expiration vulnerability in UI Edgemax Firmware
A vulnerability exists in The EdgeMax EdgeSwitch firmware <v1.9.1 where the EdgeSwitch legacy web interface SIDSSL cookie for admin can be guessed, enabling the attacker to obtain high privileges and get a root shell by a Command injection.
network
low complexity
ui CWE-613
critical
9.8
2020-08-17 CVE-2020-8233 OS Command Injection vulnerability in multiple products
A command injection vulnerability exists in EdgeSwitch firmware <v1.9.0 that allowed an authenticated read-only user to execute arbitrary shell commands over the HTTP interface, allowing them to escalate privileges.
network
low complexity
ui opensuse CWE-78
8.8
2020-08-17 CVE-2020-8232 Information Exposure vulnerability in UI Edgeswitch Firmware 1.7.1
An information disclosure vulnerability exists in EdgeMax EdgeSwitch firmware v1.9.0 that allowed read only users could obtain unauthorized information through SNMP community pages.
network
low complexity
ui CWE-200
6.5
2020-07-30 CVE-2020-8213 Information Exposure Through an Error Message vulnerability in UI Unifi Protect 1.13.3
An information exposure vulnerability exists in UniFi Protect before v1.13.4-beta.5 that allowed unauthenticated attackers access to valid usernames for the UniFi Protect web application via HTTP response code and response timing.
network
low complexity
ui CWE-209
5.3
2020-07-02 CVE-2020-8188 OS Command Injection vulnerability in UI Unifi Protect Firmware
We have recently released new version of UniFi Protect firmware v1.13.3 and v1.14.10 for Unifi Cloud Key Gen2 Plus and UniFi Dream Machine Pro/UNVR respectively that fixes vulnerabilities found on Protect firmware v1.13.2, v1.14.9 and prior according to the description below:View only users can run certain custom commands which allows them to assign themselves unauthorized roles and escalate their privileges.
network
low complexity
ui CWE-78
8.8
2020-06-08 CVE-2020-12695 Incorrect Default Permissions vulnerability in multiple products
The Open Connectivity Foundation UPnP specification before 2020-04-17 does not forbid the acceptance of a subscription request with a delivery URL on a different network segment than the fully qualified event-subscription URL, aka the CallStranger issue.
7.5
2020-05-26 CVE-2020-8171 OS Command Injection vulnerability in UI Airos
We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:There are certain end-points containing functionalities that are vulnerable to command injection.
network
low complexity
ui CWE-78
critical
9.8
2020-05-26 CVE-2020-8170 Cross-site Scripting vulnerability in UI Airos
We have recently released new version of AirMax AirOS firmware v6.3.0 for TI, XW and XM boards that fixes vulnerabilities found on AirMax AirOS v6.2.0 and prior TI, XW and XM boards, according to the description below:Multiple end-points with parameters vulnerable to reflected cross site scripting (XSS), allowing attackers to abuse the user' session information and/or account takeover of the admin user.Mitigation:Update to the latest AirMax AirOS firmware version available at the AirMax download page.
network
low complexity
ui CWE-79
6.1