Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application

0
High
VulnerabilityCVE-2026-21633cvecve-2026-21633
Published: Mon Jan 05 2026 (01/05/2026, 16:47:38 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Protect Application

Description

CVE-2026-21633 is a high-severity vulnerability in Ubiquiti Inc's UniFi Protect Application (version 6. 1. 79 and earlier) that allows an attacker on an adjacent network to gain unauthorized access to UniFi Protect Cameras by exploiting a discovery protocol flaw. The vulnerability does not require authentication or user interaction and impacts confidentiality, integrity, and availability of the affected devices. Exploitation could lead to full compromise of camera feeds and control, posing significant privacy and security risks. The vulnerability has a CVSS score of 8. 8, indicating a critical impact. Mitigation involves updating the UniFi Protect Application to version 6. 2. 72 or later.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:45:02 UTC

Technical Analysis

CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to detect and communicate with UniFi Protect Cameras on the local network. A malicious actor positioned on an adjacent network segment can exploit this protocol vulnerability to bypass authentication mechanisms and gain unauthorized access to camera devices. This access could allow the attacker to view live camera feeds, manipulate camera settings, or disrupt camera operations, thereby compromising confidentiality, integrity, and availability. The vulnerability is classified under CWE-287 (Improper Authentication), indicating that the discovery protocol fails to properly verify the legitimacy of requests. The CVSS v3.1 base score is 8.8, with vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, meaning the attack requires adjacent network access but no privileges or user interaction, and results in high impact across all security dimensions. The vulnerability was published on January 5, 2026, and no known exploits have been reported in the wild yet. The recommended mitigation is to update the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured to prevent unauthorized access.

Potential Impact

For European organizations, this vulnerability poses a significant risk to security and privacy, especially for those relying on UniFi Protect cameras for surveillance in sensitive environments such as corporate offices, government buildings, critical infrastructure, and public spaces. Unauthorized access to camera feeds could lead to espionage, data leakage, or physical security breaches. The integrity of camera configurations could be compromised, enabling attackers to disable or manipulate surveillance. Availability could also be affected if attackers disrupt camera operations. Given the widespread use of Ubiquiti products in Europe, particularly in small to medium enterprises and some public sector deployments, the impact could be broad. The vulnerability's requirement for adjacent network access means that attackers would need some level of network proximity, which could be achieved through compromised devices, insider threats, or poorly segmented networks. The lack of authentication and user interaction requirements increases the ease of exploitation once network access is obtained.

Mitigation Recommendations

European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate this vulnerability. Network segmentation should be enforced to isolate surveillance camera networks from general user and guest networks, reducing the risk of adjacent network access by unauthorized actors. Implement strict access controls and monitoring on local networks to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) capable of identifying suspicious activity related to UniFi Protect discovery communications. Regularly audit and update all Ubiquiti devices and applications to ensure timely application of security patches. Additionally, consider disabling unnecessary discovery protocols or services if feasible, and enforce strong physical security controls to prevent unauthorized local network access. Training IT staff on the risks associated with network adjacency and lateral movement can further reduce exploitation likelihood.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bec94b7d62031395509db

Added to database: 1/5/2026, 4:53:40 PM

Last enriched: 1/12/2026, 9:45:02 PM

Last updated: 2/7/2026, 6:31:32 AM

Views: 466

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats