CVE-2025-52665
BaseFortify
Publication date: 2025-10-31
Last updated on: 2025-11-12
Assigner: HackerOne
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ui | unifi_access | From 3.3.22 (inc) to 4.0.21 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability involves a misconfiguration in UniFi's door access application, UniFi Access, where a management API was exposed without proper authentication. A malicious actor with access to the management network could exploit this to potentially interact with the system unauthorized. It affects versions 3.3.22 through 3.4.31 and was fixed in version 4.0.21 and later.
How can this vulnerability impact me? :
If exploited, this vulnerability could allow an attacker on the management network to access and potentially control the door access system without proper authorization, leading to unauthorized physical access or manipulation of access controls.
What immediate steps should I take to mitigate this vulnerability?
Update your UniFi Access Application to Version 4.0.21 or later to fix the vulnerability caused by the exposed management API without proper authentication.