Ubiquiti UniFi Vulnerability Allows Attackers to Inject Malicious Commands

Ubiquiti Networks issued a critical security advisory on July 16, 2025, addressing a severe command injection vulnerability affecting multiple UniFi Access devices.

The vulnerability, tracked as CVE-2025-27212, carries a CVSS v3.0 base score of 9.8, marking it as a critical threat that requires immediate attention from network administrators and security professionals.

Vulnerability Details and Attack Vector

The security flaw stems from improper input validation in the affected UniFi Access devices, which creates an opportunity for command injection attacks.

Security researchers Bongeun Koo (@kiddo_pwn) and Junhyung Cho (@da2Rim) discovered this vulnerability, which allows malicious actors with access to the UniFi Access management network to execute arbitrary commands on the targeted devices.

The CVSS vector string CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H indicates that this vulnerability can be exploited remotely over the network with low attack complexity, requires no privileges or user interaction, and has high impact on confidentiality, integrity, and availability of the affected systems.

This combination of factors makes it particularly dangerous for organizations using UniFi Access systems for physical security management.

Affected Products and Security Patches

The vulnerability impacts six distinct UniFi Access product lines across multiple firmware versions.

The UniFi Access Reader Pro running version 2.14.21 and earlier, UniFi Access G2 Reader Pro with version 1.10.32 and earlier, and UniFi Access G3 Reader Pro with version 1.10.30 and earlier are all susceptible to this attack vector.

Additionally, the UniFi Access Intercom (version 1.7.28 and earlier), UniFi Access G3 Intercom (version 1.7.29 and earlier), and UniFi Access Intercom Viewer (version 1.3.20 and earlier) are also affected by this critical vulnerability.

Ubiquiti has released security patches for all affected products. Users must immediately update to UniFi Access Reader Pro version 2.15.9 or later, UniFi Access G2 Reader Pro version 1.11.23 or later, UniFi Access G3 Reader Pro version 1.11.22 or later, UniFi Access Intercom version 1.8.22 or later, UniFi Access G3 Intercom version 1.8.22 or later, and UniFi Access Intercom Viewer version 1.4.39 or later.

Impact Assessment and Immediate Actions Required

The command injection vulnerability poses significant risks to organizational security infrastructure, particularly for businesses relying on UniFi Access systems for door controllers, access management, and physical security monitoring.

Successful exploitation could allow attackers to gain unauthorized access to buildings, manipulate access logs, or compromise the entire access control system.

Network administrators should immediately implement the available firmware updates and conduct thorough security assessments of their UniFi Access deployments.

Organizations should also review their network segmentation strategies to ensure management networks are properly isolated from potential attack vectors.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant updates

AnuPriya
AnuPriya
Any Priya is a cybersecurity reporter at Cyber Press, specializing in cyber attacks, dark web monitoring, data breaches, vulnerabilities, and malware. She delivers in-depth analysis on emerging threats and digital security trends.

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here