CVE-2024-54750: n/a
Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: In Ubiquiti's view there is no vulnerability as the Hardcoded Password should be after setup not before.
AI Analysis
Technical Summary
CVE-2024-54750 identifies a critical security vulnerability in the Ubiquiti U6-LR wireless access point firmware version 6.6.65. The vulnerability stems from a hardcoded password embedded in the /etc/shadow file, which is used by Unix-like systems to store hashed user passwords. This hardcoded credential allows attackers to authenticate as the root user without any prior authentication or user interaction, granting full administrative control over the device. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that can lead to complete system compromise. Although Ubiquiti asserts that the hardcoded password is only present before device setup and thus not a vulnerability post-setup, this does not eliminate the risk during the initial configuration phase or if the device is reset to factory defaults. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, highlighting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or updates have been published at the time of disclosure, and no exploits have been reported in the wild, but the potential for exploitation is significant given the ease of access and control it provides.
Potential Impact
The impact of CVE-2024-54750 is severe for organizations deploying Ubiquiti U6-LR devices, especially in enterprise, government, and critical infrastructure environments. An attacker exploiting this vulnerability can gain root-level access remotely, allowing them to manipulate device configurations, intercept or redirect network traffic, deploy malware, or use the device as a pivot point for further network intrusion. This compromises the confidentiality of sensitive data, the integrity of network operations, and the availability of wireless services. The vulnerability could facilitate espionage, data theft, service disruption, or persistent backdoor installation. Given the widespread use of Ubiquiti devices globally, the threat extends to any organization relying on these access points for wireless connectivity, including ISPs, corporate networks, educational institutions, and public Wi-Fi providers. The lack of a patch increases the window of exposure, making proactive mitigation critical to reduce risk.
Mitigation Recommendations
1. Immediately isolate affected Ubiquiti U6-LR devices running firmware 6.6.65 from untrusted or public networks to prevent unauthorized access. 2. Avoid using factory-reset or uninitialized devices in production environments until the vulnerability is addressed. 3. Monitor network traffic and device logs for unusual authentication attempts or root access activities. 4. Implement network segmentation to limit the impact of a compromised device and restrict administrative access to trusted management networks only. 5. Contact Ubiquiti support for guidance and watch for official firmware updates or patches addressing this vulnerability. 6. Consider deploying alternative wireless access points from vendors without known hardcoded credential issues if immediate patching is not feasible. 7. Employ multi-factor authentication and strong network access controls where possible to reduce the risk of lateral movement post-compromise. 8. Maintain an incident response plan tailored to network device compromises to rapidly contain and remediate potential breaches.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Japan, South Korea, India, Brazil, Netherlands, Singapore
CVE-2024-54750: n/a
Description
Ubiquiti U6-LR 6.6.65 was discovered to contain a hardcoded password vulnerability in /etc/shadow, which allows attackers to log in as root. NOTE: In Ubiquiti's view there is no vulnerability as the Hardcoded Password should be after setup not before.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-54750 identifies a critical security vulnerability in the Ubiquiti U6-LR wireless access point firmware version 6.6.65. The vulnerability stems from a hardcoded password embedded in the /etc/shadow file, which is used by Unix-like systems to store hashed user passwords. This hardcoded credential allows attackers to authenticate as the root user without any prior authentication or user interaction, granting full administrative control over the device. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that can lead to complete system compromise. Although Ubiquiti asserts that the hardcoded password is only present before device setup and thus not a vulnerability post-setup, this does not eliminate the risk during the initial configuration phase or if the device is reset to factory defaults. The CVSS v3.1 base score of 9.8 reflects the critical nature of this flaw, highlighting its network attack vector, low attack complexity, no privileges required, no user interaction, and high impact on confidentiality, integrity, and availability. No patches or updates have been published at the time of disclosure, and no exploits have been reported in the wild, but the potential for exploitation is significant given the ease of access and control it provides.
Potential Impact
The impact of CVE-2024-54750 is severe for organizations deploying Ubiquiti U6-LR devices, especially in enterprise, government, and critical infrastructure environments. An attacker exploiting this vulnerability can gain root-level access remotely, allowing them to manipulate device configurations, intercept or redirect network traffic, deploy malware, or use the device as a pivot point for further network intrusion. This compromises the confidentiality of sensitive data, the integrity of network operations, and the availability of wireless services. The vulnerability could facilitate espionage, data theft, service disruption, or persistent backdoor installation. Given the widespread use of Ubiquiti devices globally, the threat extends to any organization relying on these access points for wireless connectivity, including ISPs, corporate networks, educational institutions, and public Wi-Fi providers. The lack of a patch increases the window of exposure, making proactive mitigation critical to reduce risk.
Mitigation Recommendations
1. Immediately isolate affected Ubiquiti U6-LR devices running firmware 6.6.65 from untrusted or public networks to prevent unauthorized access. 2. Avoid using factory-reset or uninitialized devices in production environments until the vulnerability is addressed. 3. Monitor network traffic and device logs for unusual authentication attempts or root access activities. 4. Implement network segmentation to limit the impact of a compromised device and restrict administrative access to trusted management networks only. 5. Contact Ubiquiti support for guidance and watch for official firmware updates or patches addressing this vulnerability. 6. Consider deploying alternative wireless access points from vendors without known hardcoded credential issues if immediate patching is not feasible. 7. Employ multi-factor authentication and strong network access controls where possible to reduce the risk of lateral movement post-compromise. 8. Maintain an incident response plan tailored to network device compromises to rapidly contain and remediate potential breaches.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-12-06T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bc6b7ef31ef0b55ad62
Added to database: 2/25/2026, 9:38:14 PM
Last enriched: 2/26/2026, 1:54:10 AM
Last updated: 4/12/2026, 9:23:37 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.