{"vulnerability": "CVE-2025-23116", "sightings": [{"uuid": "65c03265-b234-40c6-ab1d-b35740532bdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/114088884159028871", "content": "", "creation_timestamp": "2025-03-01T19:43:38.320361Z"}, {"uuid": "286a8827-5dc8-43f9-a204-326c5398ac95", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://bsky.app/profile/bolhasec.com/post/3lko3pkyhkv26", "content": "", "creation_timestamp": "2025-03-18T16:30:10.678445Z"}, {"uuid": "56812ed8-0a97-41c2-81a8-d89fd13fbf0c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lio52ao6nk2s", "content": "", "creation_timestamp": "2025-02-21T06:03:44.010127Z"}, {"uuid": "75e7ad50-96e0-4cb9-ba78-088ec60b2afd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://mastodon.social/users/CyberSignaler/statuses/114085601841202630", "content": "", "creation_timestamp": "2025-03-01T05:48:54.295187Z"}, {"uuid": "b02f1c2d-ac2f-411b-b8b0-667ff72ff59c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://bsky.app/profile/dinosn.bsky.social/post/3lio52kijak2k", "content": "", "creation_timestamp": "2025-02-21T06:03:50.904769Z"}, {"uuid": "b8c9ee41-9196-48eb-aba5-c66099045d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2025-23116", "type": "seen", "source": "https://bsky.app/profile/kyosuke-tanaka.bsky.social/post/3lio5i33jsk2g", "content": "", "creation_timestamp": "2025-02-21T06:11:23.075966Z"}, {"uuid": "c894dbe4-5a8d-4d4a-bab5-fbb3274a50c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://bsky.app/profile/infosec.skyfleet.blue/post/3liofytij2e25", "content": "", "creation_timestamp": "2025-02-21T08:43:55.274223Z"}, {"uuid": "b71aa345-0092-49c7-96c4-cf58f79b103b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://t.me/cvedetector/19203", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-23116 - Ubiquiti UniFi Protect Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-23116 \nPublished : March 1, 2025, 3:15 a.m. | 1\u00a0hour, 26\u00a0minutes ago \nDescription : An Authentication Bypass vulnerability on UniFi Protect Application with Auto-Adopt Bridge Devices enabled could allow a malicious actor with access to UniFi Protect Cameras adjacent network to take control of UniFi Protect Cameras. \nSeverity: 9.6 | CRITICAL \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"01 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-01T06:24:39.000000Z"}, {"uuid": "befc8515-6d52-42f5-b17b-011e053da1cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "http://www.zerodayinitiative.com/advisories/ZDI-25-378/", "content": "", "creation_timestamp": "2025-06-11T03:00:00.000000Z"}, {"uuid": "c9e54957-cf39-47df-86b4-77c53c4d947e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "MISP/1e8d1b5a-3537-4a30-907d-acb1720bbd18", "content": "", "creation_timestamp": "2025-08-19T18:29:29.000000Z"}, {"uuid": "a8b540e9-81fd-401f-a41b-614a2ba5a91f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "Telegram/QSz1yTOzb82bVMuPnbkspKqsLKsiaeO81Rox7_KUFFLvrk4", "content": "", "creation_timestamp": "2025-02-22T13:01:59.000000Z"}, {"uuid": "ac5c4ece-b15c-4b9b-b8b8-ad4a34405fa7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/6032", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-23116\n\ud83d\udd25 CVSS Score: 9.6 (cvssV3_0, Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\ud83d\udd39 Description: An Authentication Bypass vulnerability on UniFi Protect Application with Auto-Adopt Bridge Devices enabled could allow a malicious actor with access to UniFi Protect Cameras adjacent network to take control of UniFi Protect Cameras.\n\ud83d\udccf Published: 2025-03-01T01:52:36.160Z\n\ud83d\udccf Modified: 2025-03-01T01:52:36.160Z\n\ud83d\udd17 References:\n1. https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f", "creation_timestamp": "2025-03-01T02:27:16.000000Z"}, {"uuid": "099edb47-5a03-4da4-9a1c-f339b8bde76f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://t.me/cybersecplayground/106", "content": "\ud83d\udea8\ud83d\udea8 HACKER ALERT: UBIQUITI UNIFI CAMERAS UNDER ATTACK!\n\n\u26a0\ufe0f CVE-2025-23115: Remote Code Execution (RCE) = Total Camera Takeover!\n\u26a0\ufe0f CVE-2025-23116: Auth Bypass via Auto-Adopt Bridge.\n\n\ud83d\udd0d ZoomEye Dork:\napp=\"Ubiquiti UniFi Protect\"\n3.2K+ Vulnerable Hits!\n\n\ud83d\udd17 SHODAN Dork:\ntitle:\"UniFi Protect\"\n\n\ud83d\udd17 ZoomEye Search Link:\nZoomEye Link\n\n\ud83d\udcf0 Details:\nRead full details about these vulnerabilities and how hackers can hijack Ubiquiti UniFi Protect cameras:\n\ud83d\udd17 Read More\n\n\ud83d\udce2 Stay updated with more security alerts and insights:\n\ud83d\udc49 @cybersecplayground\n\n#CVE2025 #Ubiquiti #UniFiProtect #RCE #BugBounty #InfoSec #CyberSecurity #Vulnerability #RemoteCodeExecution", "creation_timestamp": "2025-02-22T10:36:33.000000Z"}, {"uuid": "04abe625-7809-42da-9e39-d276c58df5f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-23116", "type": "seen", "source": "https://t.me/CyberBulletin/2871", "content": "\u26a1CVE-2025-23115 &amp; CVE-2025-23116: Hackers Can Hijack Ubiquiti UniFi Protect Cameras.\n\n#CyberBulletin", "creation_timestamp": "2025-04-01T04:04:04.000000Z"}]}