CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application
CVE-2026-21633 is a high-severity vulnerability in Ubiquiti Inc's UniFi Protect Application (version 6. 1. 79 and earlier) that allows an attacker on an adjacent network to gain unauthorized access to UniFi Protect Cameras by exploiting a discovery protocol flaw. The vulnerability does not require authentication or user interaction and impacts confidentiality, integrity, and availability of the affected devices. Exploitation could lead to full compromise of camera feeds and control, posing significant privacy and security risks. The vulnerability has a CVSS score of 8. 8, indicating a critical impact. Mitigation involves updating the UniFi Protect Application to version 6. 2. 72 or later.
AI Analysis
Technical Summary
CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to detect and communicate with UniFi Protect Cameras on the local network. A malicious actor positioned on an adjacent network segment can exploit this protocol vulnerability to bypass authentication mechanisms and gain unauthorized access to camera devices. This access could allow the attacker to view live camera feeds, manipulate camera settings, or disrupt camera operations, thereby compromising confidentiality, integrity, and availability. The vulnerability is classified under CWE-287 (Improper Authentication), indicating that the discovery protocol fails to properly verify the legitimacy of requests. The CVSS v3.1 base score is 8.8, with vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires adjacent network access but no privileges or user interaction, and results in high impact across all security dimensions. The vulnerability was published on January 5, 2026, and no known exploits have been reported in the wild yet. The recommended mitigation is to update the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured to prevent unauthorized access.
Potential Impact
For European organizations, this vulnerability poses a significant risk to security and privacy, especially for those relying on UniFi Protect cameras for surveillance in sensitive environments such as corporate offices, government buildings, critical infrastructure, and public spaces. Unauthorized access to camera feeds could lead to espionage, data leakage, or physical security breaches. The integrity of camera configurations could be compromised, enabling attackers to disable or manipulate surveillance. Availability could also be affected if attackers disrupt camera operations. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and some public sector deployments, the impact could be broad. The vulnerability's requirement for adjacent network access means that attackers would need some level of network proximity, which could be achieved through compromised devices, insider threats, or poorly segmented networks. The lack of authentication and user interaction requirements increases the ease of exploitation once network access is obtained.
Mitigation Recommendations
European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate this vulnerability. Network segmentation should be enforced to isolate surveillance camera networks from general user and guest networks, reducing the risk of adjacent network access by unauthorized actors. Implement strict access controls and monitoring on local networks to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) capable of identifying suspicious activity related to UniFi Protect discovery communications. Regularly audit and update all Ubiquiti devices and applications to ensure timely application of security patches. Additionally, consider disabling unnecessary discovery protocols or services if feasible, and enforce strong physical security controls to prevent unauthorized local network access. Training IT staff on the risks associated with network adjacency and lateral movement can further reduce exploitation likelihood.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application
Description
CVE-2026-21633 is a high-severity vulnerability in Ubiquiti Inc's UniFi Protect Application (version 6. 1. 79 and earlier) that allows an attacker on an adjacent network to gain unauthorized access to UniFi Protect Cameras by exploiting a discovery protocol flaw. The vulnerability does not require authentication or user interaction and impacts confidentiality, integrity, and availability of the affected devices. Exploitation could lead to full compromise of camera feeds and control, posing significant privacy and security risks. The vulnerability has a CVSS score of 8. 8, indicating a critical impact. Mitigation involves updating the UniFi Protect Application to version 6. 2. 72 or later.
AI-Powered Analysis
Technical Analysis
CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to detect and communicate with UniFi Protect Cameras on the local network. A malicious actor positioned on an adjacent network segment can exploit this protocol vulnerability to bypass authentication mechanisms and gain unauthorized access to camera devices. This access could allow the attacker to view live camera feeds, manipulate camera settings, or disrupt camera operations, thereby compromising confidentiality, integrity, and availability. The vulnerability is classified under CWE-287 (Improper Authentication), indicating that the discovery protocol fails to properly verify the legitimacy of requests. The CVSS v3.1 base score is 8.8, with vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires adjacent network access but no privileges or user interaction, and results in high impact across all security dimensions. The vulnerability was published on January 5, 2026, and no known exploits have been reported in the wild yet. The recommended mitigation is to update the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured to prevent unauthorized access.
Potential Impact
For European organizations, this vulnerability poses a significant risk to security and privacy, especially for those relying on UniFi Protect cameras for surveillance in sensitive environments such as corporate offices, government buildings, critical infrastructure, and public spaces. Unauthorized access to camera feeds could lead to espionage, data leakage, or physical security breaches. The integrity of camera configurations could be compromised, enabling attackers to disable or manipulate surveillance. Availability could also be affected if attackers disrupt camera operations. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and some public sector deployments, the impact could be broad. The vulnerability's requirement for adjacent network access means that attackers would need some level of network proximity, which could be achieved through compromised devices, insider threats, or poorly segmented networks. The lack of authentication and user interaction requirements increases the ease of exploitation once network access is obtained.
Mitigation Recommendations
European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate this vulnerability. Network segmentation should be enforced to isolate surveillance camera networks from general user and guest networks, reducing the risk of adjacent network access by unauthorized actors. Implement strict access controls and monitoring on local networks to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) capable of identifying suspicious activity related to UniFi Protect discovery communications. Regularly audit and update all Ubiquiti devices and applications to ensure timely application of security patches. Additionally, consider disabling unnecessary discovery protocols or services if feasible, and enforce strong physical security controls to prevent unauthorized local network access. Training IT staff on the risks associated with network adjacency and lateral movement can further reduce exploitation likelihood.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-01T15:00:02.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bec94b7d62031395509db
Added to database: 1/5/2026, 4:53:40 PM
Last enriched: 1/12/2026, 9:45:02 PM
Last updated: 2/7/2026, 6:31:32 AM
Views: 466
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.