CVE-2026-21634: Vulnerability in Ubiquiti Inc UniFi Protect Application
A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart. Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
AI Analysis
Technical Summary
CVE-2026-21634 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw arises from an overflow condition in the application's discovery protocol, which is used for device and service detection within local networks. A malicious actor with access to the adjacent network segment can send crafted packets that overflow this protocol's buffer, causing the application to restart unexpectedly. This results in a denial-of-service (DoS) condition, impacting the availability of the UniFi Protect service. The vulnerability does not compromise confidentiality or integrity since it does not allow data leakage or unauthorized modification. The attack vector requires network adjacency, meaning the attacker must be on the same or a directly connected network segment, but no privileges or user interaction are necessary. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability and ease of exploitation. The vendor has addressed this issue in UniFi Protect Application version 6.2.72 and later, recommending users to update promptly. No public exploits have been reported, but the potential for service disruption in environments relying on UniFi Protect is significant, especially in surveillance and security monitoring contexts.
Potential Impact
For European organizations, the primary impact of CVE-2026-21634 is the potential disruption of video surveillance and security monitoring services provided by the UniFi Protect Application. This can lead to temporary loss of video feeds, delayed incident detection, and reduced situational awareness, which may affect physical security operations. Critical infrastructure, government facilities, and enterprises relying on UniFi Protect for security monitoring could experience operational interruptions. Although the vulnerability does not expose sensitive data or allow unauthorized control, the denial-of-service effect can degrade trust in security systems and increase response times to physical security incidents. Organizations in sectors such as transportation, energy, healthcare, and public safety that deploy UniFi Protect devices are particularly at risk. The requirement for network adjacency limits remote exploitation but does not eliminate risk in environments where network segmentation is weak or where attackers can gain local network access through compromised devices or insider threats.
Mitigation Recommendations
European organizations should immediately upgrade the UniFi Protect Application to version 6.2.72 or later to remediate this vulnerability. Beyond patching, network segmentation should be enforced to restrict access to the UniFi Protect discovery protocol to trusted devices only, minimizing the attack surface. Implement strict access controls and monitoring on local networks to detect anomalous traffic patterns indicative of discovery protocol abuse. Employ network intrusion detection systems (NIDS) capable of identifying malformed packets targeting the discovery protocol. Regularly audit and update firmware and software of all UniFi devices to ensure they are not running vulnerable versions. Additionally, consider isolating surveillance systems on dedicated VLANs with limited access to reduce the risk of lateral movement by attackers. Incident response plans should include procedures for rapid restoration of UniFi Protect services in case of disruption.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-21634: Vulnerability in Ubiquiti Inc UniFi Protect Application
Description
A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart. Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
AI-Powered Analysis
Technical Analysis
CVE-2026-21634 is a vulnerability identified in the UniFi Protect Application by Ubiquiti Inc, specifically affecting versions 6.1.79 and earlier. The flaw arises from an overflow condition in the application's discovery protocol, which is used for device and service detection within local networks. A malicious actor with access to the adjacent network segment can send crafted packets that overflow this protocol's buffer, causing the application to restart unexpectedly. This results in a denial-of-service (DoS) condition, impacting the availability of the UniFi Protect service. The vulnerability does not compromise confidentiality or integrity since it does not allow data leakage or unauthorized modification. The attack vector requires network adjacency, meaning the attacker must be on the same or a directly connected network segment, but no privileges or user interaction are necessary. The CVSS v3.1 base score is 6.5, reflecting a medium severity primarily due to the impact on availability and ease of exploitation. The vendor has addressed this issue in UniFi Protect Application version 6.2.72 and later, recommending users to update promptly. No public exploits have been reported, but the potential for service disruption in environments relying on UniFi Protect is significant, especially in surveillance and security monitoring contexts.
Potential Impact
For European organizations, the primary impact of CVE-2026-21634 is the potential disruption of video surveillance and security monitoring services provided by the UniFi Protect Application. This can lead to temporary loss of video feeds, delayed incident detection, and reduced situational awareness, which may affect physical security operations. Critical infrastructure, government facilities, and enterprises relying on UniFi Protect for security monitoring could experience operational interruptions. Although the vulnerability does not expose sensitive data or allow unauthorized control, the denial-of-service effect can degrade trust in security systems and increase response times to physical security incidents. Organizations in sectors such as transportation, energy, healthcare, and public safety that deploy UniFi Protect devices are particularly at risk. The requirement for network adjacency limits remote exploitation but does not eliminate risk in environments where network segmentation is weak or where attackers can gain local network access through compromised devices or insider threats.
Mitigation Recommendations
European organizations should immediately upgrade the UniFi Protect Application to version 6.2.72 or later to remediate this vulnerability. Beyond patching, network segmentation should be enforced to restrict access to the UniFi Protect discovery protocol to trusted devices only, minimizing the attack surface. Implement strict access controls and monitoring on local networks to detect anomalous traffic patterns indicative of discovery protocol abuse. Employ network intrusion detection systems (NIDS) capable of identifying malformed packets targeting the discovery protocol. Regularly audit and update firmware and software of all UniFi devices to ensure they are not running vulnerable versions. Additionally, consider isolating surveillance systems on dedicated VLANs with limited access to reduce the risk of lateral movement by attackers. Incident response plans should include procedures for rapid restoration of UniFi Protect services in case of disruption.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-01T15:00:02.338Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695bec94b7d62031395509de
Added to database: 1/5/2026, 4:53:40 PM
Last enriched: 1/5/2026, 5:09:54 PM
Last updated: 1/7/2026, 9:43:34 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15158: CWE-434 Unrestricted Upload of File with Dangerous Type in eastsidecode WP Enable WebP
HighCVE-2025-15018: CWE-639 Authorization Bypass Through User-Controlled Key in djanym Optional Email
CriticalCVE-2025-15000: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tfrommen Page Keys
MediumCVE-2025-14999: CWE-352 Cross-Site Request Forgery (CSRF) in kentothemes Latest Tabs
MediumCVE-2025-13531: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in hayyatapps Stylish Order Form Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.