Skip to main content

CVE-2025-27214: Vulnerability in Ubiquiti Inc UniFi Connect EV Station Pro

Critical
VulnerabilityCVE-2025-27214cvecve-2025-27214
Published: Thu Aug 21 2025 (08/21/2025, 00:01:24 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Connect EV Station Pro

Description

A Missing Authentication for Critical Function vulnerability in the UniFi Connect EV Station Pro may allow a malicious actor with physical or adjacent access to perform an unauthorized factory reset. Affected Products: UniFi Connect EV Station Pro (Version 1.5.18 and earlier) Mitigation: Update UniFi Connect EV Station Pro to Version 1.5.27 or later

AI-Powered Analysis

AILast updated: 08/28/2025, 01:27:44 UTC

Technical Analysis

CVE-2025-27214 is a critical vulnerability identified in the Ubiquiti Inc UniFi Connect EV Station Pro, specifically affecting versions 1.5.18 and earlier. The vulnerability is classified as a Missing Authentication for Critical Function (CWE-306), which means that a critical function—in this case, the factory reset capability—can be executed without any authentication checks. This flaw allows a malicious actor with physical or adjacent network access to the device to perform an unauthorized factory reset. The vulnerability has a CVSS v3.1 base score of 9.8, indicating a critical severity level. The CVSS vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network (AV:N) with low attack complexity (AC:L), requires no privileges (PR:N) or user interaction (UI:N), and impacts confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The scope remains unchanged (S:U). The factory reset function, when triggered without authentication, can erase all configurations and potentially disrupt the normal operation of the EV charging station, leading to denial of service and loss of control over the device. This vulnerability is particularly concerning because it does not require any authentication or user interaction, making exploitation straightforward for anyone with network or physical proximity. The vendor has released a patch in version 1.5.27 to address this issue, and updating to this or later versions is strongly recommended. No known exploits are currently reported in the wild, but the critical nature of the flaw suggests that exploitation attempts could emerge rapidly.

Potential Impact

For European organizations, especially those involved in electric vehicle infrastructure, this vulnerability poses a significant risk. The UniFi Connect EV Station Pro is used to manage EV charging stations, which are critical components of sustainable transport infrastructure. Successful exploitation could lead to unauthorized resets, causing service disruptions and potential denial of service at charging stations. This could impact public and private charging networks, leading to operational downtime, loss of revenue, and reputational damage. Additionally, the loss of device configuration could expose organizations to further security risks if devices are reset to insecure default states. Given the increasing adoption of EV infrastructure across Europe, such disruptions could affect urban centers, transport hubs, and commercial facilities. The vulnerability also raises concerns about physical safety and reliability of EV charging services, which are becoming essential for the transition to green energy. The lack of authentication requirement lowers the barrier for attackers, increasing the likelihood of exploitation in environments where physical or adjacent network access is possible, such as public or semi-public charging stations.

Mitigation Recommendations

Organizations should immediately verify the firmware version of their UniFi Connect EV Station Pro devices and upgrade to version 1.5.27 or later, where the vulnerability is patched. Beyond patching, it is critical to restrict physical and network access to these devices. This includes deploying network segmentation to isolate EV charging station management interfaces from public or less secure networks. Implementing strong access control policies and monitoring network traffic for unusual reset commands can help detect and prevent exploitation attempts. Physical security controls should be enhanced to prevent unauthorized personnel from gaining adjacent access to the devices. Additionally, organizations should audit device configurations regularly to ensure no unauthorized resets have occurred and maintain backups of device configurations to enable rapid recovery. Incorporating anomaly detection systems that alert on unexpected device resets or configuration changes can provide early warning of exploitation attempts. Finally, coordinating with Ubiquiti support and subscribing to security advisories will ensure timely awareness of any emerging threats or additional patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.799Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a6693fad5a09ad0009f905

Added to database: 8/21/2025, 12:33:03 AM

Last enriched: 8/28/2025, 1:27:44 AM

Last updated: 9/2/2025, 10:18:34 AM

Views: 7

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats