Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-27215: Vulnerability in Ubiquiti Inc UniFi Connect Display Cast

0
High
VulnerabilityCVE-2025-27215cvecve-2025-27215
Published: Thu Aug 21 2025 (08/21/2025, 00:01:24 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Connect Display Cast

Description

An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system. Affected Products: UniFi Connect Display Cast (Version 1.10.3 and earlier) UniFi Connect Display Cast Pro (Version 1.0.89 and earlier) UniFi Connect Display Cast Lite (Version 1.0.3 and earlier) Mitigation: Update UniFi Connect Display Cast to Version 1.10.7 or later Update UniFi Connect Display Cast Pro to Version 1.0.94 or later Update UniFi Connect Display Cast Lite to Version 1.1.8 or later

AI-Powered Analysis

AILast updated: 08/28/2025, 01:27:55 UTC

Technical Analysis

CVE-2025-27215 is a high-severity vulnerability affecting multiple versions of Ubiquiti Inc's UniFi Connect Display Cast product line, including the standard, Pro, and Lite editions. The root cause is an improper access control weakness (CWE-284) in the API of these devices. Specifically, an attacker who is authenticated to the API can perform unsupported or unauthorized changes to the system. This implies that while the attacker must have some level of legitimate access (authenticated), the access control mechanisms fail to properly restrict the scope of actions they can perform, allowing privilege escalation or unauthorized configuration changes. The vulnerability affects UniFi Connect Display Cast versions 1.10.3 and earlier, UniFi Connect Display Cast Pro versions 1.0.89 and earlier, and UniFi Connect Display Cast Lite versions 1.0.3 and earlier. The vendor has released patches in versions 1.10.7, 1.0.94, and 1.1.8 respectively to address this issue. The CVSS v3.1 base score is 8.1, indicating a high severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N) reveals that the vulnerability is remotely exploitable over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality and integrity significantly, but not availability. No known exploits are reported in the wild yet. The vulnerability could allow an attacker to manipulate device configurations or data, potentially leading to unauthorized access to sensitive information or disruption of normal device operations. Given the role of these devices in network environments, such unauthorized changes could undermine network security or stability.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those deploying UniFi Connect Display Cast devices in enterprise, educational, or public sector environments. Unauthorized changes to device configurations could lead to exposure of sensitive network information, interception or manipulation of data streams, or creation of backdoors for further attacks. Since these devices are often integrated into network infrastructure for display and communication purposes, compromise could affect operational integrity and confidentiality. The requirement for authentication means insider threats or compromised credentials could be leveraged by attackers. The impact is heightened in sectors with strict data protection regulations such as GDPR, where unauthorized data access or leakage could result in legal and financial penalties. Additionally, disruption or manipulation of these devices could impair business continuity or public services relying on them. The absence of known exploits in the wild currently provides a window for mitigation, but the high severity score and ease of exploitation suggest that threat actors may develop exploits soon.

Mitigation Recommendations

European organizations should prioritize updating all affected UniFi Connect Display Cast devices to the patched versions: 1.10.7 or later for standard, 1.0.94 or later for Pro, and 1.1.8 or later for Lite editions. Beyond patching, organizations should enforce strict access controls on the API, including network segmentation to limit API access only to trusted management hosts. Implement strong authentication mechanisms, such as multi-factor authentication, to reduce risk from compromised credentials. Regularly audit API access logs for suspicious activities and unauthorized changes. Employ network monitoring to detect anomalous traffic patterns targeting these devices. Where possible, disable or restrict API access if not required. Additionally, maintain an inventory of all UniFi Connect Display Cast devices to ensure comprehensive coverage of patches and controls. Educate administrators on the risks of improper access control and the importance of credential security. Finally, integrate these devices into broader vulnerability management and incident response processes to ensure rapid detection and remediation of any exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.799Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a6693fad5a09ad0009f908

Added to database: 8/21/2025, 12:33:03 AM

Last enriched: 8/28/2025, 1:27:55 AM

Last updated: 10/7/2025, 12:52:04 AM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats