Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21633: Vulnerability in Ubiquiti Inc UniFi Protect Application

0
High
VulnerabilityCVE-2026-21633cvecve-2026-21633
Published: Mon Jan 05 2026 (01/05/2026, 16:47:38 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Protect Application

Description

A malicious actor with access to the adjacent network could obtain unauthorized access to a UniFi Protect Camera by exploiting a discovery protocol vulnerability in the Unifi Protect Application (Version 6.1.79 and earlier). Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

AI-Powered Analysis

AILast updated: 01/05/2026, 17:08:28 UTC

Technical Analysis

CVE-2026-21633 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw resides in the discovery protocol used by the application to identify and communicate with UniFi Protect Cameras on the local network. An attacker positioned on an adjacent network segment can exploit this vulnerability to bypass authentication controls and gain unauthorized access to the cameras. This access potentially allows the attacker to view live video feeds, manipulate camera settings, or disrupt camera operations, impacting confidentiality, integrity, and availability of surveillance data. The vulnerability does not require any user interaction or prior authentication, significantly lowering the barrier for exploitation. The CVSS v3.1 base score of 8.8 reflects the high severity, with attack vector classified as adjacent network, low attack complexity, no privileges required, and no user interaction needed. The vulnerability is mitigated by updating the UniFi Protect Application to version 6.2.72 or later, where the discovery protocol has been secured against unauthorized access. No public exploits have been reported yet, but given the nature of the flaw and the critical role of surveillance systems, the risk remains substantial.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security and privacy. Unauthorized access to surveillance cameras can lead to espionage, unauthorized monitoring of sensitive areas, and potential manipulation or disabling of security systems. This can compromise the safety of personnel, intellectual property, and critical infrastructure. Organizations in sectors such as government, transportation, energy, and finance that rely on UniFi Protect for video surveillance are particularly vulnerable. The breach of confidentiality and integrity of video feeds can also lead to regulatory compliance issues under GDPR, especially if personal data is exposed. The availability impact could disrupt security operations, leading to gaps in surveillance coverage. The ease of exploitation without authentication increases the threat level, especially in environments where network segmentation is weak or adjacent network access can be gained through compromised devices or insider threats.

Mitigation Recommendations

European organizations should immediately verify their UniFi Protect Application versions and upgrade to version 6.2.72 or later to remediate the vulnerability. Beyond patching, network segmentation should be enforced to isolate surveillance devices from general user networks, limiting adjacent network access. Implement strict access controls and monitoring on network segments hosting UniFi Protect devices to detect anomalous discovery protocol traffic. Employ network intrusion detection systems (NIDS) tuned to identify suspicious activity related to UniFi Protect discovery protocols. Regularly audit and update firmware on all UniFi Protect cameras and related infrastructure. Educate IT and security teams about the risks of adjacent network attacks and ensure physical security of network access points to prevent unauthorized connections. Finally, review and enhance incident response plans to quickly address any potential compromise of surveillance systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bec94b7d62031395509db

Added to database: 1/5/2026, 4:53:40 PM

Last enriched: 1/5/2026, 5:08:28 PM

Last updated: 1/7/2026, 9:59:38 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats