Multiple vulnerabilities in Ubiquiti Networks products



Published: 2024-07-04
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2024-29206
CVE-2024-29208
CVE-2024-29207
CWE-ID CWE-284
CWE-620
CWE-295
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
UniFi Connect EV Station
Hardware solutions / Other hardware appliances

UniFi Connect EV Station Pro
Hardware solutions / Other hardware appliances

UniFi Access G2 Reader Pro
Hardware solutions / Other hardware appliances

UniFi Access Reader Pro
Hardware solutions / Other hardware appliances

UniFi Access Intercom
Hardware solutions / Other hardware appliances

UniFi Access Intercom Viewer
Hardware solutions / Other hardware appliances

UniFi Connect Display
Hardware solutions / Other hardware appliances

UniFi Connect Display Cast
Hardware solutions / Other hardware appliances

UniFi Connect Application
Client/Desktop applications / Other client software

Vendor Ubiquiti Networks

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU93792

Risk: Low

CVSSv3.1: 2 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-29206

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions within the setDebugPortEnabled method. A remote administrator can enable Android Debug Bridge (ADB) and make unsupported changes to the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UniFi Connect EV Station: 1.1.18

UniFi Connect EV Station Pro: 1.1.18

UniFi Access G2 Reader Pro: 1.2.172

UniFi Access Reader Pro: 2.7.238

UniFi Access Intercom: 1.0.66

UniFi Access Intercom Viewer: 1.0.5

UniFi Connect Display: 1.9.324

UniFi Connect Display Cast: 1.6.225

UniFi Connect Application: before 3.10.7

CPE2.3 External links

http://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09
http://www.zerodayinitiative.com/advisories/ZDI-24-881/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Unverified Password Change

EUVDB-ID: #VU93794

Risk: Low

CVSSv3.1: 2 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-29208

CWE-ID: CWE-620 - Unverified Password Change

Exploit availability: No

Description

The vulnerability allows a remote user to compromise the target system.

The vulnerability exists due to lack of proper validation of the old password before setting a new password. A remote administrator can change the system password without knowing the previous password.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UniFi Connect EV Station: 1.1.18

UniFi Connect EV Station Pro: 1.1.18

UniFi Connect Display: 1.9.324

UniFi Connect Display Cast: 1.6.225

UniFi Connect Application: before 3.10.7

CPE2.3 External links

http://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09
http://www.zerodayinitiative.com/advisories/ZDI-24-879/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Improper Certificate Validation

EUVDB-ID: #VU93793

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-29207

CWE-ID: CWE-295 - Improper Certificate Validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to improper server certificate verification within the EVCLauncher application. A remote attacker on the local network can take control of the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

UniFi Connect Application: 3.7.9

UniFi Connect EV Station: 1.1.18

UniFi Connect EV Station Pro: 1.1.18

UniFi Connect Display: 1.9.324

UniFi Connect Display Cast: 1.6.225

CPE2.3 External links

http://community.ui.com/releases/Security-Advisory-bulletin-039-039/44e24007-2c2c-4ac0-bebf-3f19b9b24f09
http://www.zerodayinitiative.com/advisories/ZDI-24-880/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###