Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-52665: Vulnerability in Ubiquiti Inc UniFi Access Application

0
Critical
VulnerabilityCVE-2025-52665cvecve-2025-52665
Published: Thu Oct 30 2025 (10/30/2025, 23:30:28 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Access Application

Description

A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.  Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). 
 Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.

AI-Powered Analysis

AILast updated: 11/07/2025, 10:21:16 UTC

Technical Analysis

CVE-2025-52665 is a critical security vulnerability identified in Ubiquiti Inc's UniFi Access Application, specifically affecting versions 3.3.22 through 3.4.31. The root cause is a misconfiguration that exposes a management API without proper authentication controls, categorized under CWE-306 (Missing Authentication for Critical Function). This flaw allows any malicious actor with access to the management network to interact with the API without credentials, enabling full compromise of the door access management system. The vulnerability impacts confidentiality by potentially exposing sensitive access control data, integrity by allowing unauthorized changes to access permissions or configurations, and availability by enabling denial of service or lockout scenarios. The CVSS v3.1 base score is 10.0, reflecting the highest severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and scope changed (S:C), indicating that exploitation can affect resources beyond the initially vulnerable component. The vulnerability was introduced in version 3.3.22 and fixed in version 4.0.21 and later. Although no exploits are currently known in the wild, the ease of exploitation and critical impact make it a significant threat. The affected product is widely used for physical access control in enterprise and critical infrastructure environments, making the vulnerability particularly dangerous if exploited.

Potential Impact

For European organizations, the impact of CVE-2025-52665 is substantial. UniFi Access Application is commonly deployed in corporate offices, government buildings, and critical infrastructure facilities to manage physical access controls. Exploitation could lead to unauthorized physical access, data breaches, sabotage, or disruption of essential services. Confidentiality breaches could expose sensitive personnel and access logs, while integrity violations could allow attackers to alter access permissions or disable security controls. Availability impacts could result in denial of access for legitimate users or lockouts, potentially disrupting business operations or emergency responses. Given the vulnerability requires only network access without authentication, any compromise or lateral movement within the management network could lead to full system takeover. This risk is amplified in environments with insufficient network segmentation or weak internal security controls. The critical nature of physical access systems means that exploitation could have cascading effects on organizational security and safety.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately upgrade their UniFi Access Application to version 4.0.21 or later, where the authentication issue has been resolved. Network segmentation should be enforced to restrict access to the management network only to authorized personnel and systems, minimizing exposure. Implement strict access controls and monitoring on the management network to detect unauthorized access attempts. Regularly audit configurations to ensure no management APIs are exposed without authentication. Employ network intrusion detection/prevention systems (IDS/IPS) to identify anomalous API usage patterns. Additionally, organizations should review and update incident response plans to address potential physical security breaches stemming from this vulnerability. Where immediate patching is not feasible, consider temporarily disabling remote management features or isolating the affected systems until updates can be applied.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2025-06-18T15:00:00.895Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6903f7a3aebfcd5474a44756

Added to database: 10/30/2025, 11:41:23 PM

Last enriched: 11/7/2025, 10:21:16 AM

Last updated: 12/15/2025, 9:48:53 AM

Views: 949

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats