Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-54749: n/a

0
High
VulnerabilityCVE-2024-54749cvecve-2024-54749
Published: Fri Dec 06 2024 (12/06/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-54749 is a high-severity vulnerability affecting Ubiquiti U7-Pro firmware version 7. 0. 35, involving a hardcoded password found in the /etc/shadow file. This flaw could theoretically allow attackers to gain root access without authentication. However, the supplier disputes the practical exploitability, stating that the device requires setting a new password during installation, preventing use of the hardcoded password in deployed devices. The CVSS score is 7. 5, reflecting high impact on confidentiality, integrity, and availability, but with attack complexity and privileges required limiting ease of exploitation. No known exploits are currently in the wild. Organizations using Ubiquiti U7-Pro devices should verify firmware versions and ensure secure installation procedures are followed. Mitigation includes verifying password policies, monitoring for unauthorized access attempts, and applying any future patches.

AI-Powered Analysis

AILast updated: 02/26/2026, 01:53:57 UTC

Technical Analysis

The vulnerability identified as CVE-2024-54749 concerns the Ubiquiti U7-Pro device running firmware version 7.0.35. A hardcoded password was discovered embedded in the /etc/shadow file within the firmware image, which if exploitable, would allow an attacker to log in as root without prior authentication. This type of vulnerability falls under CWE-798 (Use of Hard-coded Credentials), a critical security weakness because it can completely compromise device security. However, the supplier disputes the practical exploitability of this vulnerability, clarifying that the device cannot be deployed without the user setting a new password during installation, which effectively disables the hardcoded password. The CVSS v3.1 score of 7.5 reflects a high severity, with the vector indicating that the attack requires adjacent network access (AV:A), high attack complexity (AC:H), no privileges or user interaction needed (PR:N/UI:N), and impacts confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild to date. The lack of a patch link suggests that either no patch has been released yet or the supplier considers the risk mitigated by the installation process. This vulnerability highlights the importance of secure firmware design and thorough validation of embedded credentials. Organizations using this device should be cautious and verify that installation procedures are strictly followed to prevent unauthorized root access.

Potential Impact

If exploited, this vulnerability could allow attackers to gain root-level access to Ubiquiti U7-Pro devices, leading to full control over the device. This could result in unauthorized configuration changes, interception or manipulation of network traffic, deployment of malware, or use of the device as a pivot point for further attacks within the network. The impact on confidentiality, integrity, and availability is high, potentially compromising sensitive data and disrupting network services. However, the requirement for adjacent network access and high attack complexity reduces the likelihood of widespread exploitation. The dispute by the supplier about the vulnerability's exploitability further limits immediate risk, but if installation procedures are bypassed or devices are deployed with the hardcoded password active, the threat becomes critical. Organizations relying on these devices for network infrastructure or IoT deployments could face significant operational and security risks if this vulnerability is exploited.

Mitigation Recommendations

Organizations should ensure that all Ubiquiti U7-Pro devices are installed following the supplier's recommended procedures, specifically enforcing the mandatory password change during initial setup to disable any hardcoded credentials. Network segmentation should be employed to limit access to these devices, restricting adjacent network access only to trusted administrators. Continuous monitoring and logging of device access attempts should be implemented to detect any unauthorized login activities. Firmware versions should be audited regularly, and organizations should stay alert for any official patches or updates from Ubiquiti addressing this issue. If possible, consider deploying additional authentication mechanisms such as multi-factor authentication or VPN access for device management. In environments where risk tolerance is low, temporarily isolating or replacing affected devices until a confirmed patch is available may be prudent. Finally, educating administrators about the risks of hardcoded credentials and secure device configuration is essential.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-12-06T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bc6b7ef31ef0b55ad5f

Added to database: 2/25/2026, 9:38:14 PM

Last enriched: 2/26/2026, 1:53:57 AM

Last updated: 2/26/2026, 6:13:52 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats