Skip to main content

CVE-2025-27212: Vulnerability in Ubiquiti Inc UniFi Access Reader Pro

Unknown
VulnerabilityCVE-2025-27212cvecve-2025-27212
Published: Mon Aug 04 2025 (08/04/2025, 22:12:18 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Access Reader Pro

Description

An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network. Affected Products: UniFi Access Reader Pro (Version 2.14.21 and earlier) UniFi Access G2 Reader Pro (Version 1.10.32 and earlier) UniFi Access G3 Reader Pro (Version 1.10.30 and earlier) UniFi Access Intercom (Version 1.7.28 and earlier) UniFi Access G3 Intercom (Version 1.7.29 and earlier) UniFi Access Intercom Viewer (Version 1.3.20 and earlier) Mitigation: Update UniFi Access Reader Pro Version 2.15.9 or later Update UniFi Access G2 Reader Pro Version 1.11.23 or later Update UniFi Access G3 Reader Pro Version 1.11.22 or later Update UniFi Access Intercom Version 1.8.22 or later Update UniFi Access G3 Intercom Version 1.8.22 or later Update UniFi Access Intercom Viewer Version 1.4.39 or later

AI-Powered Analysis

AILast updated: 08/04/2025, 22:47:43 UTC

Technical Analysis

CVE-2025-27212 is a security vulnerability identified in multiple UniFi Access devices produced by Ubiquiti Inc, specifically affecting the UniFi Access Reader Pro series and related intercom products. The vulnerability arises from improper input validation within the affected devices' software, which could allow a malicious actor with access to the UniFi Access management network to perform command injection attacks. Command injection vulnerabilities enable attackers to execute arbitrary commands on the device's underlying operating system, potentially leading to unauthorized control over the device, data exfiltration, or disruption of device functionality. The affected products include UniFi Access Reader Pro (versions 2.14.21 and earlier), UniFi Access G2 Reader Pro (1.10.32 and earlier), UniFi Access G3 Reader Pro (1.10.30 and earlier), UniFi Access Intercom (1.7.28 and earlier), UniFi Access G3 Intercom (1.7.29 and earlier), and UniFi Access Intercom Viewer (1.3.20 and earlier). The vulnerability requires the attacker to have network access to the UniFi Access management network, which typically implies internal network access or compromised network segments. No known exploits are currently reported in the wild. Mitigation is available through firmware and software updates to versions 2.15.9 or later for UniFi Access Reader Pro, 1.11.23 or later for UniFi Access G2 Reader Pro, 1.11.22 or later for UniFi Access G3 Reader Pro, 1.8.22 or later for both UniFi Access Intercom and G3 Intercom, and 1.4.39 or later for UniFi Access Intercom Viewer. These updates address the improper input validation and prevent command injection attacks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security infrastructure relying on UniFi Access devices. These devices are often deployed in corporate offices, data centers, and critical infrastructure facilities to control and monitor physical access. Successful exploitation could allow attackers to execute arbitrary commands on access control devices, potentially disabling security controls, unlocking doors, or manipulating access logs. This could lead to unauthorized physical access, data breaches, or sabotage. Additionally, compromised devices could serve as footholds for lateral movement within internal networks, escalating the scope of an attack. Given the reliance on these devices for secure access management, the impact on confidentiality, integrity, and availability of physical security systems is substantial. The requirement for network access to the management network somewhat limits the attack surface to insiders or attackers who have already breached perimeter defenses, but this does not diminish the severity for organizations with less segmented or poorly secured internal networks.

Mitigation Recommendations

European organizations should prioritize immediate patching of all affected UniFi Access devices to the versions specified by Ubiquiti Inc. Beyond patching, organizations should implement strict network segmentation to isolate UniFi Access management networks from general corporate networks and the internet, reducing the risk of unauthorized access. Employing strong network access controls, such as VLANs, firewall rules, and zero-trust principles, will limit exposure. Monitoring and logging of access control device network traffic should be enhanced to detect anomalous commands or communications indicative of exploitation attempts. Additionally, organizations should review and enforce strong authentication and authorization policies for management interfaces to prevent unauthorized access. Regular vulnerability assessments and penetration testing focused on physical security infrastructure can help identify residual risks. Finally, organizations should maintain an inventory of all UniFi Access devices deployed to ensure comprehensive coverage during patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.799Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68913509ad5a09ad00e397ec

Added to database: 8/4/2025, 10:32:41 PM

Last enriched: 8/4/2025, 10:47:43 PM

Last updated: 8/5/2025, 12:34:48 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats