Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52663: Vulnerability in Ubiquiti Inc UniFi Talk Touch

0
Unknown
VulnerabilityCVE-2025-52663cvecve-2025-52663
Published: Thu Oct 30 2025 (10/30/2025, 23:30:28 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Talk Touch

Description

A vulnerability was identified in certain UniFi Talk devices where internal debugging functionality remained unintentionally enabled. This issue could allow an attacker with access to the UniFi Talk management network to invoke internal debug operations through the device API. Affected Products: UniFi Talk Touch (Version 1.21.16 and earlier) UniFi Talk Touch Max (Version 2.21.22 and earlier) UniFi Talk G3 Phones (Version 3.21.26 and earlier) Mitigation: Update the UniFi Talk Touch to Version 1.21.17 or later. Update the UniFi Talk Touch Max to Version 2.21.23 or later. Update the UniFi Talk G3 Phones to Version 3.21.27 or later.

AI-Powered Analysis

AILast updated: 10/30/2025, 23:56:49 UTC

Technical Analysis

CVE-2025-52663 is a security vulnerability affecting multiple models of Ubiquiti Inc's UniFi Talk VoIP devices, specifically the Talk Touch, Talk Touch Max, and Talk G3 Phones running firmware versions 1.21.16 and earlier, 2.21.22 and earlier, and 3.21.26 and earlier respectively. The core issue arises from internal debugging functionality that was unintentionally left enabled in these devices. This debugging interface can be accessed through the device API by an attacker who has network-level access to the UniFi Talk management network. Exploiting this vulnerability allows the attacker to invoke internal debug operations, which could lead to unauthorized control or manipulation of the device's functions. While the exact impact of these debug operations is not detailed, such access typically enables attackers to bypass normal security controls, gather sensitive information, or disrupt device operation. The vulnerability does not require user interaction but does require the attacker to be on the management network, limiting exposure to internal or compromised network environments. No known public exploits have been reported to date. Ubiquiti has addressed the issue by releasing updated firmware versions: 1.21.17 or later for Talk Touch, 2.21.23 or later for Talk Touch Max, and 3.21.27 or later for Talk G3 Phones. Organizations using affected devices should apply these updates promptly to mitigate risk.

Potential Impact

For European organizations, the vulnerability presents a significant risk primarily to those deploying UniFi Talk devices within their internal communication infrastructure. Successful exploitation could allow attackers to manipulate VoIP devices, potentially intercepting or disrupting voice communications, altering device configurations, or using the devices as pivot points for further network intrusion. This can impact confidentiality by exposing sensitive communications, integrity by enabling unauthorized changes, and availability by disrupting telephony services. Sectors such as government, finance, healthcare, and critical infrastructure that rely heavily on secure and reliable voice communications are particularly vulnerable. The requirement for network access limits remote exploitation but does not eliminate risk, especially in cases of insider threats or compromised internal networks. Given the widespread use of Ubiquiti products in Europe, unpatched devices could lead to localized or targeted attacks affecting organizational operations and data privacy compliance obligations under regulations like GDPR.

Mitigation Recommendations

Organizations should immediately verify the firmware versions of all UniFi Talk Touch, Talk Touch Max, and Talk G3 Phones deployed within their networks. They must update these devices to the fixed versions: 1.21.17 or later for Talk Touch, 2.21.23 or later for Talk Touch Max, and 3.21.27 or later for Talk G3 Phones. Network segmentation should be enforced to restrict access to the UniFi Talk management network only to authorized personnel and systems, minimizing exposure. Implement strict access controls and monitoring on management interfaces to detect and prevent unauthorized API calls. Regularly audit device configurations to ensure debugging features remain disabled post-update. Additionally, organizations should monitor network traffic for unusual API activity indicative of exploitation attempts. Incorporating these devices into broader vulnerability management and incident response plans will enhance resilience. Finally, educating internal teams about the risks of internal network threats can reduce the likelihood of insider exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-06-18T15:00:00.895Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6903f7a3aebfcd5474a44750

Added to database: 10/30/2025, 11:41:23 PM

Last enriched: 10/30/2025, 11:56:49 PM

Last updated: 10/31/2025, 6:40:44 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats