Skip to main content

CVE-2025-27215: Vulnerability in Ubiquiti Inc UniFi Connect Display Cast

High
VulnerabilityCVE-2025-27215cvecve-2025-27215
Published: Thu Aug 21 2025 (08/21/2025, 00:01:24 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Connect Display Cast

Description

An Improper Access Control could allow a malicious actor authenticated in the API of certain UniFi Connect Display Cast devices to make unsupported changes to the system. Affected Products: UniFi Connect Display Cast (Version 1.10.3 and earlier) UniFi Connect Display Cast Pro (Version 1.0.89 and earlier) UniFi Connect Display Cast Lite (Version 1.0.3 and earlier) Mitigation: Update UniFi Connect Display Cast to Version 1.10.7 or later Update UniFi Connect Display Cast Pro to Version 1.0.94 or later Update UniFi Connect Display Cast Lite to Version 1.1.8 or later

AI-Powered Analysis

AILast updated: 08/21/2025, 00:36:56 UTC

Technical Analysis

CVE-2025-27215 is a security vulnerability identified in Ubiquiti Inc's UniFi Connect Display Cast product line, including UniFi Connect Display Cast (version 1.10.3 and earlier), UniFi Connect Display Cast Pro (version 1.0.89 and earlier), and UniFi Connect Display Cast Lite (version 1.0.3 and earlier). The vulnerability stems from improper access control within the API of these devices. Specifically, an authenticated malicious actor with access to the API can perform unsupported or unauthorized changes to the system. This implies that while the attacker must have valid authentication credentials, the access control mechanisms fail to restrict the scope of actions that can be performed, allowing potentially harmful modifications that could compromise device integrity or functionality. The vulnerability does not require exploitation through user interaction beyond authentication, and there are no known exploits in the wild at the time of publication. The vendor has addressed the issue by releasing patched versions: 1.10.7 or later for UniFi Connect Display Cast, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. No CVSS score has been assigned to this vulnerability yet.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on UniFi Connect Display Cast devices for digital signage, collaboration, or display management in corporate, educational, or public sector environments. Unauthorized changes to system configurations could lead to service disruptions, unauthorized data exposure, or manipulation of displayed content, potentially damaging organizational reputation or causing operational downtime. Since the vulnerability requires authentication, the risk is heightened in environments where credential management is weak or where insider threats exist. Additionally, compromised devices could be leveraged as footholds for lateral movement within networks, increasing the risk of broader network compromise. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and public institutions, the vulnerability could affect a broad range of sectors including education, government, and retail.

Mitigation Recommendations

Organizations should prioritize updating affected UniFi Connect Display Cast devices to the patched versions specified by Ubiquiti: 1.10.7 or later for the standard version, 1.0.94 or later for the Pro version, and 1.1.8 or later for the Lite version. Beyond patching, organizations should enforce strong authentication mechanisms such as multi-factor authentication (MFA) for API access to reduce the risk of credential compromise. Network segmentation should be implemented to isolate these devices from critical infrastructure and limit the potential impact of a compromised device. Regular auditing and monitoring of API access logs can help detect unauthorized or anomalous activities early. Additionally, organizations should review and tighten API permissions and access control policies to ensure the principle of least privilege is enforced. Finally, educating users and administrators about secure credential management and potential insider threats will further reduce exploitation risk.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hackerone
Date Reserved
2025-02-20T01:00:01.799Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68a6693fad5a09ad0009f908

Added to database: 8/21/2025, 12:33:03 AM

Last enriched: 8/21/2025, 12:36:56 AM

Last updated: 8/21/2025, 2:29:40 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats