CVE-2025-52665 (GCVE-0-2025-52665)
Vulnerability from cvelistv5
Published
2025-10-30 23:30
      Modified
2025-10-30 23:30
      
          Severity ?
        
        
          VLAI Severity ?
        
        
          EPSS score ?
        
        Summary
A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later. 
 
Affected Products:
UniFi Access Application (Version 3.3.22 through 3.4.31). 
 
Mitigation:
Update your UniFi Access Application to Version 4.0.21 or later.
            
          
        References
          
        Impacted products
        | Vendor | Product | Version | ||
|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Application | Version: 3.3.22   ≤ 3.4.31 | 
{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "UniFi Access Application",
          "vendor": "Ubiquiti Inc",
          "versions": [
            {
              "lessThanOrEqual": "3.4.31",
              "status": "affected",
              "version": "3.3.22",
              "versionType": "semver"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious actor with access to the management network could exploit a misconfiguration in UniFi\u2019s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.\u00a0\n \nAffected Products:\nUniFi Access Application (Version 3.3.22 through 3.4.31). \u2028 \n\nMitigation:\nUpdate your UniFi Access Application to Version 4.0.21 or later."
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-10-30T23:30:28.329Z",
        "orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
        "shortName": "hackerone"
      },
      "references": [
        {
          "url": "https://community.ui.com/releases/Security-Advisory-Bulletin-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
    "assignerShortName": "hackerone",
    "cveId": "CVE-2025-52665",
    "datePublished": "2025-10-30T23:30:28.329Z",
    "dateReserved": "2025-06-18T15:00:00.895Z",
    "dateUpdated": "2025-10-30T23:30:28.329Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2025-52665\",\"sourceIdentifier\":\"support@hackerone.com\",\"published\":\"2025-10-31T00:15:37.000\",\"lastModified\":\"2025-10-31T00:15:37.000\",\"vulnStatus\":\"Received\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A malicious actor with access to the management network could exploit a misconfiguration in UniFi\u2019s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.\u00a0\\n \\nAffected Products:\\nUniFi Access Application (Version 3.3.22 through 3.4.31). \u2028 \\n\\nMitigation:\\nUpdate your UniFi Access Application to Version 4.0.21 or later.\"}],\"metrics\":{},\"references\":[{\"url\":\"https://community.ui.com/releases/Security-Advisory-Bulletin-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191\",\"source\":\"support@hackerone.com\"}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 10, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52665\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-31T14:05:32.616691Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-306\", \"description\": \"CWE-306 Missing Authentication for Critical Function\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-31T14:05:55.588Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Ubiquiti Inc\", \"product\": \"UniFi Access Application\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.3.22\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"3.4.31\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://community.ui.com/releases/Security-Advisory-Bulletin-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A malicious actor with access to the management network could exploit a misconfiguration in UniFi\\u2019s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version 4.0.21 and later.\\u00a0\\n \\nAffected Products:\\nUniFi Access Application (Version 3.3.22 through 3.4.31). \\u2028 \\n\\nMitigation:\\nUpdate your UniFi Access Application to Version 4.0.21 or later.\"}], \"providerMetadata\": {\"orgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"shortName\": \"hackerone\", \"dateUpdated\": \"2025-10-30T23:30:28.329Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2025-52665\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-31T14:07:27.850Z\", \"dateReserved\": \"2025-06-18T15:00:00.895Z\", \"assignerOrgId\": \"36234546-b8fa-4601-9d6f-f4e334aa8ea1\", \"datePublished\": \"2025-10-30T23:30:28.329Z\", \"assignerShortName\": \"hackerone\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.2"
    }
  }
}
  Loading…
      Loading…
      Sightings
| Author | Source | Type | Date | 
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
      Loading…