CVE-2019-25651
AES-CBC Key Recovery in Ubiquiti UniFi Devices Enables Unauthorized Control
Publication date: 2026-03-27
Last updated on: 2026-04-29
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| ubiquiti | unifi_network_controller | to 5.10.12 (exc) |
| ubiquiti | uap_fw | to 4.0.6 (exc) |
| ubiquiti | uap-ac | * |
| ubiquiti | uap-ac_v2 | * |
| ubiquiti | uap-ac_outdoor_fw | to 3.8.17 (exc) |
| ubiquiti | usw_fw | to 4.0.6 (exc) |
| ubiquiti | usg_fw | to 4.4.34 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Ubiquiti UniFi Network Controller and various Ubiquiti device firmwares that use AES-CBC encryption for device-to-controller communication. The AES-CBC encryption mode used contains cryptographic weaknesses that allow attackers with adjacent network access to capture encrypted traffic and exploit these weaknesses to recover the encryption keys.
By recovering the encryption keys, attackers can gain unauthorized control and management capabilities over the affected network devices.
How can this vulnerability impact me? :
The impact of this vulnerability is significant because attackers who can capture encrypted traffic on an adjacent network can derive the encryption keys used for device communication.
This enables unauthorized control and management of network devices, potentially leading to network compromise, disruption of services, or unauthorized access to sensitive network configurations.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows attackers to recover encryption keys from captured traffic due to weaknesses in AES-CBC encryption used for device-to-controller communication. This unauthorized access and control over network devices could lead to breaches of confidentiality, integrity, and availability of sensitive data.
Such security weaknesses may impact compliance with common standards and regulations like GDPR and HIPAA, which require strong protection of personal and sensitive data. Failure to adequately secure network communications could result in violations of these regulations, potentially leading to legal and financial consequences.