CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application
A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
AI Analysis
Technical Summary
CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to identify and communicate with UniFi Protect Cameras on the local network. An attacker positioned on an adjacent network segment can exploit this vulnerability to bypass authentication controls and gain unauthorized access to the cameras. This access potentially allows the attacker to view live video feeds, manipulate camera settings, or disrupt camera operations, impacting confidentiality, integrity, and availability of surveillance data. The vulnerability does not require any user interaction or prior authentication, significantly lowering the barrier for exploitation. The CVSS v3.1 base score of 8.8 reflects the high severity, with attack vector classified as adjacent network, low attack complexity, no privileges required, and no user interaction needed. The vulnerability is mitigated by updating the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured against unauthorized access. No public exploits have been reported yet, but given the nature of the flaw and the critical role of surveillance systems, the risk remains substantial.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security and privacy. Unauthorized access to surveillance cameras can lead to espionage, unauthorized monitoring of sensitive areas, and potential manipulation or disabling of security systems. This can compromise the safety of personnel, intellectual property, and critical infrastructure. Organizations in sectors such as government, transportation, energy, and finance that rely on UniFi Protect for video surveillance are particularly vulnerable. The breach of confidentiality and integrity of video feeds can also lead to regulatory compliance issues under GDPR, especially if personal data is exposed. The availability impact could disrupt security operations, leading to gaps in surveillance coverage. The ease of exploitation without authentication increases the threat level, especially in environments where network segmentation is weak or adjacent network access can be gained through compromised devices or insider threats.
Mitigation Recommendations
European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate the vulnerability. Beyond patching, network segmentation should be enforced to isolate surveillance devices from general user networks, limiting adjacent network access. Implement strict access controls and monitoring on network segments hosting UniFi Protect devices to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) tuned to identify suspicious activity related to UniFi Protect discovery protocols. Regularly audit and update firmware on all UniFi Protect cameras and related infrastructure. Educate IT and security teams about the risks of adjacent network attacks and ensure physical security of network access points to prevent unauthorized connections. Finally, review and enhance incident response plans to quickly address any potential compromise of surveillance systems.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Belgium, Sweden, Austria
CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application
Description
A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
AI-Powered Analysis
Technical Analysis
CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to identify and communicate with UniFi Protect Cameras on the local network. An attacker positioned on an adjacent network segment can exploit this vulnerability to bypass authentication controls and gain unauthorized access to the cameras. This access potentially allows the attacker to view live video feeds, manipulate camera settings, or disrupt camera operations, impacting confidentiality, integrity, and availability of surveillance data. The vulnerability does not require any user interaction or prior authentication, significantly lowering the barrier for exploitation. The CVSS v3.1 base score of 8.8 reflects the high severity, with attack vector classified as adjacent network, low attack complexity, no privileges required, and no user interaction needed. The vulnerability is mitigated by updating the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured against unauthorized access. No public exploits have been reported yet, but given the nature of the flaw and the critical role of surveillance systems, the risk remains substantial.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security and privacy. Unauthorized access to surveillance cameras can lead to espionage, unauthorized monitoring of sensitive areas, and potential manipulation or disabling of security systems. This can compromise the safety of personnel, intellectual property, and critical infrastructure. Organizations in sectors such as government, transportation, energy, and finance that rely on UniFi Protect for video surveillance are particularly vulnerable. The breach of confidentiality and integrity of video feeds can also lead to regulatory compliance issues under GDPR, especially if personal data is exposed. The availability impact could disrupt security operations, leading to gaps in surveillance coverage. The ease of exploitation without authentication increases the threat level, especially in environments where network segmentation is weak or adjacent network access can be gained through compromised devices or insider threats.
Mitigation Recommendations
European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate the vulnerability. Beyond patching, network segmentation should be enforced to isolate surveillance devices from general user networks, limiting adjacent network access. Implement strict access controls and monitoring on network segments hosting UniFi Protect devices to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) tuned to identify suspicious activity related to UniFi Protect discovery protocols. Regularly audit and update firmware on all UniFi Protect cameras and related infrastructure. Educate IT and security teams about the risks of adjacent network attacks and ensure physical security of network access points to prevent unauthorized connections. Finally, review and enhance incident response plans to quickly address any potential compromise of surveillance systems.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-01T15:00:02.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bec94b7d62031395509db
Added to database: 1/5/2026, 4:53:40 PM
Last enriched: 1/5/2026, 5:08:28 PM
Last updated: 1/7/2026, 9:59:38 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68637: CWE-297 Improper Validation of Certificate with Host Mismatch in Apache Software Foundation Apache Uniffle
UnknownCVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.