Skip to main content

CVE-2025-23123: Vulnerability in Ubiquiti Inc UniFi Protect Cameras

Critical
VulnerabilityCVE-2025-23123cvecve-2025-23123
Published: Mon May 19 2025 (05/19/2025, 01:25:08 UTC)
Source: CVE
Vendor/Project: Ubiquiti Inc
Product: UniFi Protect Cameras

Description

A malicious actor with access to the management network could execute a remote code execution (RCE) by exploiting a heap buffer overflow vulnerability in the UniFi Protect Cameras (Version 4.75.43 and earlier) firmware.

AI-Powered Analysis

AILast updated: 07/11/2025, 20:32:37 UTC

Technical Analysis

CVE-2025-23123 is a critical remote code execution (RCE) vulnerability identified in Ubiquiti Inc's UniFi Protect Cameras firmware versions 4.75.43 and earlier. The vulnerability arises from a heap buffer overflow (CWE-122) that can be exploited by a malicious actor who has access to the management network where these cameras operate. Exploiting this flaw allows an attacker to execute arbitrary code remotely without requiring any authentication or user interaction. The vulnerability has a CVSS v3.0 base score of 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that impacts confidentiality, integrity, and availability (C:H/I:H/A:H). This means the attacker can fully compromise the affected device, potentially gaining control over the camera system, intercepting or manipulating video feeds, or using the compromised device as a foothold for further network intrusion. The vulnerability was reserved in January 2025 and published in May 2025, with no known exploits in the wild yet. However, given the critical nature and ease of exploitation, the threat is significant. UniFi Protect Cameras are widely used in enterprise and residential environments for video surveillance, making this vulnerability a serious concern for organizations relying on these devices for security monitoring. The lack of available patches at the time of reporting further increases the urgency for mitigation.

Potential Impact

For European organizations, the impact of this vulnerability is substantial. UniFi Protect Cameras are commonly deployed in corporate offices, retail environments, critical infrastructure facilities, and residential complexes across Europe. Successful exploitation could lead to unauthorized surveillance, breach of privacy, and exposure of sensitive video data. Furthermore, attackers could leverage compromised cameras as entry points into internal networks, facilitating lateral movement and potentially leading to broader network compromise. This could disrupt business operations, damage reputation, and result in regulatory penalties under GDPR due to unauthorized data access. The criticality of the vulnerability combined with the widespread use of these cameras in sectors such as finance, healthcare, government, and manufacturing in Europe elevates the risk profile. Additionally, the ability to execute code remotely without authentication means that even less sophisticated attackers with network access could exploit this flaw, increasing the likelihood of attacks.

Mitigation Recommendations

Given the absence of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include segmenting the management network to isolate UniFi Protect Cameras from general user and internet-facing networks, thereby limiting attacker access. Employ strict network access controls and monitoring to detect anomalous traffic to and from camera devices. Disable any unnecessary services or remote management features on the cameras. Organizations should also enforce strong network authentication and consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting heap buffer overflows or unusual camera behavior. Regularly audit and update firewall rules to restrict access to the management network. Once a vendor patch becomes available, prioritize prompt testing and deployment. Additionally, consider alternative monitoring solutions or temporary removal of vulnerable devices from critical environments until remediation is complete. Maintaining up-to-date asset inventories and vulnerability management processes will aid in rapid response.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-01-11T01:00:00.618Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb7fb

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 8:32:37 PM

Last updated: 8/15/2025, 7:41:45 PM

Views: 24

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats