Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21634: Vulnerability in Ubiquiti Inc UniFi Protect Application

0
Medium
VulnerabilityCVE-2026-21634cvecve-2026-21634
Published: Mon Jan 05 2026 (01/05/2026, 16:47:38 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Protect Application

Description

A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart. Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.

AI-Powered Analysis

AILast updated: 01/05/2026, 17:09:54 UTC

Technical Analysis

CVE-2026-21634 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw arises from an overflow condition in the application's discovery protocol, which is used for device and service detection within local networks. A malicious actor with access to the adjacent network segment can send crafted packets that overflow this protocol's buffer, causing the application to restart unexpectedly. This results in a denial-of-service (DoS) condition, impacting the availability of the UniFi Protect service. The vulnerability does not compromise confidentiality or integrity since it does not allow data leakage or unauthorized modification. The attack vector requires network adjacency, meaning the attacker must be on the same or a directly connected network segment, but no privileges or user interaction are necessary. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability and ease of exploitation. The vendor has addressed this issue in UniFi Protect Application version 6.2.72 and later, recommending users to update promptly. No public exploits have been reported, but the potential for service disruption in environments relying on UniFi Protect is significant, especially in surveillance and security monitoring contexts.

Potential Impact

For European organizations, the primary impact of CVE-2026-21634 is the potential disruption of video surveillance and security monitoring services provided by the UniFi Protect Application. This can lead to temporary loss of video feeds, delayed incident detection, and reduced situational awareness, which may affect physical security operations. Critical infrastructure, government facilities, and enterprises relying on UniFi Protect for security monitoring could experience operational interruptions. Although the vulnerability does not expose sensitive data or allow unauthorized control, the denial-of-service effect can degrade trust in security systems and increase response times to physical security incidents. Organizations in sectors such as transportation, energy, healthcare, and public safety that deploy UniFi Protect devices are particularly at risk. The requirement for network adjacency limits remote exploitation but does not eliminate risk in environments where network segmentation is weak or where attackers can gain local network access through compromised devices or insider threats.

Mitigation Recommendations

European organizations should immediately upgrade the UniFi Protect Application to version 6.2.72 or later to remediate this vulnerability. Beyond patching, network segmentation should be enforced to restrict access to the UniFi Protect discovery protocol to trusted devices only, minimizing the attack surface. Implement strict access controls and monitoring on local networks to detect anomalous traffic patterns indicative of discovery protocol abuse. Employ network intrusion detection systems (NIDS) capable of identifying malformed packets targeting the discovery protocol. Regularly audit and update firmware and software of all UniFi devices to ensure they are not running vulnerable versions. Additionally, consider isolating surveillance systems on dedicated VLANs with limited access to reduce the risk of lateral movement by attackers. Incident response plans should include procedures for rapid restoration of UniFi Protect services in case of disruption.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.338Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695bec94b7d62031395509de

Added to database: 1/5/2026, 4:53:40 PM

Last enriched: 1/5/2026, 5:09:54 PM

Last updated: 1/7/2026, 9:43:34 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats