CVE-2025-23123: Vulnerability in Ubiquiti Inc UniFi Protect Cameras
A malicious actor with access to the management network could execute a remote code execution (RCE) by exploiting a heap buffer overflow vulnerability in the UniFi Protect Cameras (Version 4.75.43 and earlier) firmware.
AI Analysis
Technical Summary
CVE-2025-23123 is a critical remote code execution (RCE) vulnerability identified in Ubiquiti Inc's UniFi Protect Cameras firmware versions 4.75.43 and earlier. The vulnerability arises from a heap buffer overflow (CWE-122) that can be exploited by a malicious actor who has access to the management network where these cameras operate. Exploiting this flaw allows an attacker to execute arbitrary code remotely without requiring any authentication or user interaction. The vulnerability has a CVSS v3.0 base score of 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that impacts confidentiality, integrity, and availability (C:H/I:H/A:H). This means the attacker can fully compromise the affected device, potentially gaining control over the camera system, intercepting or manipulating video feeds, or using the compromised device as a foothold for further network intrusion. The vulnerability was reserved in January 2025 and published in May 2025, with no known exploits in the wild yet. However, given the critical nature and ease of exploitation, the threat is significant. UniFi Protect Cameras are widely used in enterprise and residential environments for video surveillance, making this vulnerability a serious concern for organizations relying on these devices for security monitoring. The lack of available patches at the time of reporting further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. UniFi Protect Cameras are commonly deployed in corporate offices, retail environments, critical infrastructure facilities, and residential complexes across Europe. Successful exploitation could lead to unauthorized surveillance, breach of privacy, and exposure of sensitive video data. Furthermore, attackers could leverage compromised cameras as entry points into internal networks, facilitating lateral movement and potentially leading to broader network compromise. This could disrupt business operations, damage reputation, and result in regulatory penalties under GDPR due to unauthorized data access. The criticality of the vulnerability combined with the widespread use of these cameras in sectors such as finance, healthcare, government, and manufacturing in Europe elevates the risk profile. Additionally, the ability to execute code remotely without authentication means that even less sophisticated attackers with network access could exploit this flaw, increasing the likelihood of attacks.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include segmenting the management network to isolate UniFi Protect Cameras from general user and internet-facing networks, thereby limiting attacker access. Employ strict network access controls and monitoring to detect anomalous traffic to and from camera devices. Disable any unnecessary services or remote management features on the cameras. Organizations should also enforce strong network authentication and consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting heap buffer overflows or unusual camera behavior. Regularly audit and update firewall rules to restrict access to the management network. Once a vendor patch becomes available, prioritize prompt testing and deployment. Additionally, consider alternative monitoring solutions or temporary removal of vulnerable devices from critical environments until remediation is complete. Maintaining up-to-date asset inventories and vulnerability management processes will aid in rapid response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Belgium, Sweden, Poland, Switzerland
CVE-2025-23123: Vulnerability in Ubiquiti Inc UniFi Protect Cameras
Description
A malicious actor with access to the management network could execute a remote code execution (RCE) by exploiting a heap buffer overflow vulnerability in the UniFi Protect Cameras (Version 4.75.43 and earlier) firmware.
AI-Powered Analysis
Technical Analysis
CVE-2025-23123 is a critical remote code execution (RCE) vulnerability identified in Ubiquiti Inc's UniFi Protect Cameras firmware versions 4.75.43 and earlier. The vulnerability arises from a heap buffer overflow (CWE-122) that can be exploited by a malicious actor who has access to the management network where these cameras operate. Exploiting this flaw allows an attacker to execute arbitrary code remotely without requiring any authentication or user interaction. The vulnerability has a CVSS v3.0 base score of 10.0, indicating maximum severity, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C) that impacts confidentiality, integrity, and availability (C:H/I:H/A:H). This means the attacker can fully compromise the affected device, potentially gaining control over the camera system, intercepting or manipulating video feeds, or using the compromised device as a foothold for further network intrusion. The vulnerability was reserved in January 2025 and published in May 2025, with no known exploits in the wild yet. However, given the critical nature and ease of exploitation, the threat is significant. UniFi Protect Cameras are widely used in enterprise and residential environments for video surveillance, making this vulnerability a serious concern for organizations relying on these devices for security monitoring. The lack of available patches at the time of reporting further increases the urgency for mitigation.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. UniFi Protect Cameras are commonly deployed in corporate offices, retail environments, critical infrastructure facilities, and residential complexes across Europe. Successful exploitation could lead to unauthorized surveillance, breach of privacy, and exposure of sensitive video data. Furthermore, attackers could leverage compromised cameras as entry points into internal networks, facilitating lateral movement and potentially leading to broader network compromise. This could disrupt business operations, damage reputation, and result in regulatory penalties under GDPR due to unauthorized data access. The criticality of the vulnerability combined with the widespread use of these cameras in sectors such as finance, healthcare, government, and manufacturing in Europe elevates the risk profile. Additionally, the ability to execute code remotely without authentication means that even less sophisticated attackers with network access could exploit this flaw, increasing the likelihood of attacks.
Mitigation Recommendations
Given the absence of an official patch at the time of disclosure, European organizations should implement immediate compensating controls. These include segmenting the management network to isolate UniFi Protect Cameras from general user and internet-facing networks, thereby limiting attacker access. Employ strict network access controls and monitoring to detect anomalous traffic to and from camera devices. Disable any unnecessary services or remote management features on the cameras. Organizations should also enforce strong network authentication and consider deploying intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting heap buffer overflows or unusual camera behavior. Regularly audit and update firewall rules to restrict access to the management network. Once a vendor patch becomes available, prioritize prompt testing and deployment. Additionally, consider alternative monitoring solutions or temporary removal of vulnerable devices from critical environments until remediation is complete. Maintaining up-to-date asset inventories and vulnerability management processes will aid in rapid response.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-01-11T01:00:00.618Z
- Cisa Enriched
- true
- Cvss Version
- 3.0
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb7fb
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 8:32:37 PM
Last updated: 1/7/2026, 4:53:45 AM
Views: 58
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighCVE-2026-22162
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.