CVE-2025-27215: Vulnerability in Ubiquiti Inc UniFi Connect Display Cast
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system. Affected Products: UniFi Connect Display Cast (Version 1.10.3 and earlier) UniFi Connect Display Cast Pro (Version 1.0.89 and earlier) UniFi Connect Display Cast Lite (Version 1.0.3 and earlier) Mitigation: Update UniFi Connect Display Cast to Version 1.10.7 or later Update UniFi Connect Display Cast Pro to Version 1.0.94 or later Update UniFi Connect Display Cast Lite to Version 1.1.8 or later
AI Analysis
Technical Summary
CVE-2025-27215 is a security vulnerability identified in Ubiquiti Inc's UniFi Connect Display Cast product line, including UniFi Connect Display Cast (version 1.10.3 and earlier), UniFi Connect Display Cast Pro (version 1.0.89 and earlier), and UniFi Connect Display Cast Lite (version 1.0.3 and earlier). The vulnerability stems from improper access control within the API of these devices. Specifically, an authenticated malicious actor with access to the API can perform unsupported or unauthorized changes to the system. This implies that while the attacker must have valid authentication credentials, the access control mechanisms fail to restrict the scope of actions that can be performed, allowing potentially harmful modifications that could compromise device integrity or functionality. The vulnerability does not require exploitation through user interaction beyond authentication, and there are no known exploits in the wild at the time of publication. The vendor has addressed the issue by releasing patched versions: 1.10.7 or later for UniFi Connect Display Cast, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. No CVSS score has been assigned to this vulnerability yet.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on UniFi Connect Display Cast devices for digital signage, collaboration, or display management in corporate, educational, or public sector environments. Unauthorized changes to system configurations could lead to service disruptions, unauthorized data exposure, or manipulation of displayed content, potentially damaging organizational reputation or causing operational downtime. Since the vulnerability requires authentication, the risk is heightened in environments where credential management is weak or where insider threats exist. Additionally, compromised devices could be leveraged as footholds for lateral movement within networks, increasing the risk of broader network compromise. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and public institutions, the vulnerability could affect a broad range of sectors including education, government, and retail.
Mitigation Recommendations
Organizations should prioritize updating affected UniFi Connect Display Cast devices to the patched versions specified by Ubiquiti: 1.10.7 or later for the standard version, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. Beyond patching, organizations should enforce strong authentication mechanisms such as multi-factor authentication (MFA) for API access to reduce the risk of credential compromise. Network segmentation should be implemented to isolate these devices from critical infrastructure and limit the potential impact of a compromised device. Regular auditing and monitoring of API access logs can help detect unauthorized or anomalous activities early. Additionally, organizations should review and tighten API permissions and access control policies to ensure the principle of least privilege is enforced. Finally, educating users and administrators about secure credential management and potential insider threats will further reduce exploitation risk.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2025-27215: Vulnerability in Ubiquiti Inc UniFi Connect Display Cast
Description
An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system. Affected Products: UniFi Connect Display Cast (Version 1.10.3 and earlier) UniFi Connect Display Cast Pro (Version 1.0.89 and earlier) UniFi Connect Display Cast Lite (Version 1.0.3 and earlier) Mitigation: Update UniFi Connect Display Cast to Version 1.10.7 or later Update UniFi Connect Display Cast Pro to Version 1.0.94 or later Update UniFi Connect Display Cast Lite to Version 1.1.8 or later
AI-Powered Analysis
Technical Analysis
CVE-2025-27215 is a security vulnerability identified in Ubiquiti Inc's UniFi Connect Display Cast product line, including UniFi Connect Display Cast (version 1.10.3 and earlier), UniFi Connect Display Cast Pro (version 1.0.89 and earlier), and UniFi Connect Display Cast Lite (version 1.0.3 and earlier). The vulnerability stems from improper access control within the API of these devices. Specifically, an authenticated malicious actor with access to the API can perform unsupported or unauthorized changes to the system. This implies that while the attacker must have valid authentication credentials, the access control mechanisms fail to restrict the scope of actions that can be performed, allowing potentially harmful modifications that could compromise device integrity or functionality. The vulnerability does not require exploitation through user interaction beyond authentication, and there are no known exploits in the wild at the time of publication. The vendor has addressed the issue by releasing patched versions: 1.10.7 or later for UniFi Connect Display Cast, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. No CVSS score has been assigned to this vulnerability yet.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on UniFi Connect Display Cast devices for digital signage, collaboration, or display management in corporate, educational, or public sector environments. Unauthorized changes to system configurations could lead to service disruptions, unauthorized data exposure, or manipulation of displayed content, potentially damaging organizational reputation or causing operational downtime. Since the vulnerability requires authentication, the risk is heightened in environments where credential management is weak or where insider threats exist. Additionally, compromised devices could be leveraged as footholds for lateral movement within networks, increasing the risk of broader network compromise. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and public institutions, the vulnerability could affect a broad range of sectors including education, government, and retail.
Mitigation Recommendations
Organizations should prioritize updating affected UniFi Connect Display Cast devices to the patched versions specified by Ubiquiti: 1.10.7 or later for the standard version, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. Beyond patching, organizations should enforce strong authentication mechanisms such as multi-factor authentication (MFA) for API access to reduce the risk of credential compromise. Network segmentation should be implemented to isolate these devices from critical infrastructure and limit the potential impact of a compromised device. Regular auditing and monitoring of API access logs can help detect unauthorized or anomalous activities early. Additionally, organizations should review and tighten API permissions and access control policies to ensure the principle of least privilege is enforced. Finally, educating users and administrators about secure credential management and potential insider threats will further reduce exploitation risk.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hackerone
- Date Reserved
- 2025-02-20T01:00:01.799Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 68a6693fad5a09ad0009f908
Added to database: 8/21/2025, 12:33:03 AM
Last enriched: 8/21/2025, 12:36:56 AM
Last updated: 8/21/2025, 2:29:40 AM
Views: 3
Related Threats
CVE-2025-53505: Improper limitation of a pathname to a restricted directory ('Path Traversal') in Intermesh BV Group-Office
MediumCVE-2025-53504: Cross-site scripting (XSS) in Intermesh BV Group-Office
MediumCVE-2025-48355: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in ProveSource LTD ProveSource Social Proof
MediumCVE-2025-57832
LowCVE-2025-57831
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.