CVE-2025-27212: Vulnerability in Ubiquiti Inc UniFi Access Reader Pro
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier) Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later
AI Analysis
Technical Summary
CVE-2025-27212 is a security vulnerability identified in multiple UniFi Access devices produced by Ubiquiti Inc, specifically affecting the UniFi Access Reader Pro series and related intercom products. The vulnerability arises from improper input validation within the affected devices' software, which could allow a malicious actor with access to the UniFi Access management network to perform command injection attacks. Command injection vulnerabilities enable attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to unauthorized control over the device, data exfiltration, or disruption of device functionality. The affected products include UniFi Access Reader Pro (versions 2.14.21 and earlier), UniFi Access G2 Reader Pro (1.10.32 and earlier), UniFi Access G3 Reader Pro (1.10.30 and earlier), UniFi Access Intercom (1.7.28 and earlier), UniFi Access G3 Intercom (1.7.29 and earlier), and UniFi Access Intercom Viewer (1.3.20 and earlier). The vulnerability requires the attacker to have network access to the UniFi Access management network, which typically implies internal network access or compromised network segments. No known exploits are currently reported in the wild. Mitigation is available through firmware and software updates to versions 2.15.9 or later for UniFi Access Reader Pro, 1.11.23 or later for UniFi Access G2 Reader Pro, 1.11.22 or later for UniFi Access G3 Reader Pro, 1.8.22 or later for both UniFi Access Intercom and G3 Intercom, and 1.4.39 or later for UniFi Access Intercom Viewer. These updates address the improper input validation and prevent command injection attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security infrastructure relying on UniFi Access devices. These devices are often deployed in corporate offices, data centers, and critical infrastructure facilities to control and monitor physical access. Successful exploitation could allow attackers to execute arbitrary commands on access control devices, potentially disabling security controls, unlocking doors, or manipulating access logs. This could lead to unauthorized physical access, data breaches, or sabotage. Additionally, compromised devices could serve as footholds for lateral movement within internal networks, escalating the scope of an attack. Given the reliance on these devices for secure access management, the impact on confidentiality, integrity, and availability of physical security systems is substantial. The requirement for network access to the management network somewhat limits the attack surface to insiders or attackers who have already breached perimeter defenses, but this does not diminish the severity for organizations with less segmented or poorly secured internal networks.
Mitigation Recommendations
European organizations should prioritize immediate patching of all affected UniFi Access devices to the versions specified by Ubiquiti Inc. Beyond patching, organizations should implement strict network segmentation to isolate UniFi Access management networks from general corporate networks and the internet, reducing the risk of unauthorized access. Employing strong network access controls, such as VLANs, firewall rules, and zero-trust principles, will limit exposure. Monitoring and logging of access control device network traffic should be enhanced to detect anomalous commands or communications indicative of exploitation attempts. Additionally, organizations should review and enforce strong authentication and authorization policies for management interfaces to prevent unauthorized access. Regular vulnerability assessments and penetration testing focused on physical security infrastructure can help identify residual risks. Finally, organizations should maintain an inventory of all UniFi Access devices deployed to ensure comprehensive coverage during patch management.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden, Belgium
CVE-2025-27212: Vulnerability in Ubiquiti Inc UniFi Access Reader Pro
Description
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier) Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later
AI-Powered Analysis
Technical Analysis
CVE-2025-27212 is a security vulnerability identified in multiple UniFi Access devices produced by Ubiquiti Inc, specifically affecting the UniFi Access Reader Pro series and related intercom products. The vulnerability arises from improper input validation within the affected devices' software, which could allow a malicious actor with access to the UniFi Access management network to perform command injection attacks. Command injection vulnerabilities enable attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to unauthorized control over the device, data exfiltration, or disruption of device functionality. The affected products include UniFi Access Reader Pro (versions 2.14.21 and earlier), UniFi Access G2 Reader Pro (1.10.32 and earlier), UniFi Access G3 Reader Pro (1.10.30 and earlier), UniFi Access Intercom (1.7.28 and earlier), UniFi Access G3 Intercom (1.7.29 and earlier), and UniFi Access Intercom Viewer (1.3.20 and earlier). The vulnerability requires the attacker to have network access to the UniFi Access management network, which typically implies internal network access or compromised network segments. No known exploits are currently reported in the wild. Mitigation is available through firmware and software updates to versions 2.15.9 or later for UniFi Access Reader Pro, 1.11.23 or later for UniFi Access G2 Reader Pro, 1.11.22 or later for UniFi Access G3 Reader Pro, 1.8.22 or later for both UniFi Access Intercom and G3 Intercom, and 1.4.39 or later for UniFi Access Intercom Viewer. These updates address the improper input validation and prevent command injection attacks.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security infrastructure relying on UniFi Access devices. These devices are often deployed in corporate offices, data centers, and critical infrastructure facilities to control and monitor physical access. Successful exploitation could allow attackers to execute arbitrary commands on access control devices, potentially disabling security controls, unlocking doors, or manipulating access logs. This could lead to unauthorized physical access, data breaches, or sabotage. Additionally, compromised devices could serve as footholds for lateral movement within internal networks, escalating the scope of an attack. Given the reliance on these devices for secure access management, the impact on confidentiality, integrity, and availability of physical security systems is substantial. The requirement for network access to the management network somewhat limits the attack surface to insiders or attackers who have already breached perimeter defenses, but this does not diminish the severity for organizations with less segmented or poorly secured internal networks.
Mitigation Recommendations
European organizations should prioritize immediate patching of all affected UniFi Access devices to the versions specified by Ubiquiti Inc. Beyond patching, organizations should implement strict network segmentation to isolate UniFi Access management networks from general corporate networks and the internet, reducing the risk of unauthorized access. Employing strong network access controls, such as VLANs, firewall rules, and zero-trust principles, will limit exposure. Monitoring and logging of access control device network traffic should be enhanced to detect anomalous commands or communications indicative of exploitation attempts. Additionally, organizations should review and enforce strong authentication and authorization policies for management interfaces to prevent unauthorized access. Regular vulnerability assessments and penetration testing focused on physical security infrastructure can help identify residual risks. Finally, organizations should maintain an inventory of all UniFi Access devices deployed to ensure comprehensive coverage during patch management.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-02-20T01:00:01.799Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68913509ad5a09ad00e397ec
Added to database: 8/4/2025, 10:32:41 PM
Last enriched: 8/4/2025, 10:47:43 PM
Last updated: 8/5/2025, 12:34:48 AM
Views: 3
Related Threats
CVE-2025-8537: Allocation of Resources in Axiomatic Bento4
MediumCVE-2025-8535: Cross Site Scripting in cronoh NanoVault
MediumCVE-2025-54871: CWE-284: Improper Access Control in steveseguin electroncapture
MediumCVE-2025-54870: CWE-636: Not Failing Securely ('Failing Open') in leakingmemory vtun-ng
HighCVE-2025-54865: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in FTB-Gamepedia Tilesheets
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.