Ubiquiti UniFi Protect摄像头漏洞允许远程代码执行
Ubiquiti UniFi Protect摄像头存在严重安全漏洞(CVE-2025-23123),CVSS评分满分10.0,允许攻击者远程执行代码。该漏洞影响所有4.75.43及以下版本固件,可导致摄像头完全控制、窃听监控画面或网络入侵。用户需立即更新至4.75.62或更高版本以修复问题。 2025-5-8 13:43:5 Author: cybersecuritynews.com(查看原文) 阅读量:15 收藏

Ubiquiti UniFi Protect Camera Vulnerability

A critical security vulnerability in Ubiquiti UniFi Protect Cameras could allow attackers to execute arbitrary code remotely. 

The flaw, which received the highest possible CVSS score of 10.0, affects all camera firmware versions 4.75.43 and earlier, prompting an urgent call for users to update their systems immediately.

The vulnerability, tracked as CVE-2025-23123, involves a heap buffer overflow in the camera firmware that enables remote code execution (RCE) capabilities. 

Google News

Critical RCE in UniFi Protect Cameras

According to the Security Advisory Bulletin released by Ubiquiti, “A malicious actor with access to the management network could execute a remote code execution (RCE) by exploiting a heap buffer overflow vulnerability in the UniFi Protect Cameras.”

Security researchers note that achieving a perfect CVSS score of 10.0 is rare, highlighting the critical nature of this vulnerability. 

The complete CVSS vector – CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H – indicates that the vulnerability requires no user interaction to exploit, can be accessed through the network, and could lead to complete system compromise.

The heap buffer overflow vulnerability could allow attackers who gain access to the management network to potentially:

  • Gain complete control over camera systems
  • Eavesdrop on surveillance feeds
  • Manipulate video recordings or live footage
  • Use compromised cameras as entry points to pivot deeper into secured networks

Security expert Mathew Marcus, who discovered the vulnerability, emphasized that while attackers need access to the management network, many home and small business deployments lack proper network segmentation, making exploitation relatively straightforward in non-segmented environments.

Risk FactorsDetails
Affected ProductsUniFi Protect Cameras (Version 4.75.43 and earlier)
ImpactRemote Code Execution (RCE)
Exploit PrerequisitesAccess to management network; no privileges or user interaction required
CVSS 3.1 Score10.0 (Critical)

Mitigation Steps

Ubiquiti strongly urges all UniFi Protect Camera users to immediately update to firmware version 4.75.62 or later to address the vulnerability. The update is available through the standard UniFi firmware update process.

In the same security advisory, Ubiquiti also disclosed a second, less critical vulnerability (CVE-2025-23164) affecting the UniFi Protect Application versions 5.3.41 and earlier. 

This secondary issue involves a misconfigured access token mechanism that could allow continued access to livestream feeds even after links have been disabled. 

To address this issue, users should update the UniFi Protect Application to version 5.3.45 or later.

This is not the first high-severity vulnerability discovered in Ubiquiti’s UniFi Protect ecosystem in recent months. Earlier this year, security researchers identified other critical flaws, including CVE-2025-23115 and CVE-2025-23116, which also affected the camera systems

Organizations using UniFi Protect cameras implement proper network segmentation as an additional security measure to limit the potential impact of such vulnerabilities, even after applying the necessary firmware updates.

Setting Up SOC Team? – Download Free Ultimate SIEM Pricing Guide (PDF) For Your SOC Team -> Free Download


文章来源: https://cybersecuritynews.com/ubiquiti-unifi-protect-camera-vulnerability/
如有侵权请联系:admin#unsafe.sh