CVE-2019-5456
📋 TL;DR
CVE-2019-5456 is an SMTP man-in-the-middle vulnerability in UniFi Controller software that allows attackers to intercept SMTP credentials by proxying traffic between the controller and SMTP server. This affects UniFi Controller versions 5.10.21 and earlier. Attackers can capture authentication credentials for malicious use.
💻 Affected Systems
- Ubiquiti UniFi Controller
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain SMTP credentials, potentially enabling email spoofing, phishing campaigns, credential reuse attacks, and unauthorized access to email services.
Likely Case
SMTP credentials are captured and used for spam campaigns, credential stuffing attacks, or lateral movement within the network.
If Mitigated
With proper network segmentation and monitoring, impact is limited to credential exposure requiring rotation and investigation.
🎯 Exploit Status
Exploitation requires network position between controller and SMTP server. Public proof-of-concept demonstrates credential interception.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.10.22 and later
Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-003-003/982bbaa8-2a07-4f81-a5f6-0bb84753f391
Restart Required: Yes
Instructions:
1. Download UniFi Controller version 5.10.22 or later from Ubiquiti. 2. Stop the UniFi Controller service. 3. Install the updated version. 4. Restart the UniFi Controller service. 5. Verify the update completed successfully.
🔧 Temporary Workarounds
Disable SMTP notifications
allTemporarily disable SMTP email notifications in UniFi Controller settings
Use SMTP with TLS
allConfigure SMTP to use TLS encryption for all communications
🧯 If You Can't Patch
- Implement network segmentation to isolate UniFi Controller from potential MITM positions
- Monitor network traffic between controller and SMTP server for anomalies
🔍 How to Verify
Check if Vulnerable:
Check UniFi Controller version in web interface under Settings > Controller > Controller Information
Check Version:
On Linux: dpkg -l | grep unifi or check web interface
Verify Fix Applied:
Verify version is 5.10.22 or higher and test SMTP functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual SMTP connection attempts
- Failed SMTP authentication from unexpected sources
Network Indicators:
- Unexpected devices routing SMTP traffic
- SMTP traffic not using expected encryption
SIEM Query:
source="unifi-controller" AND (event_type="smtp_error" OR event_type="auth_failure")
🔗 References
- https://community.ui.com/releases/862b962b-55f6-4324-96be-610f647d5c1c
- https://community.ui.com/releases/9f698d0b-8279-40d3-9f1a-d36db4813124
- https://community.ui.com/releases/Security-Advisory-Bulletin-003-003/982bbaa8-2a07-4f81-a5f6-0bb84753f391
- https://hackerone.com/reports/519582
- https://community.ui.com/releases/862b962b-55f6-4324-96be-610f647d5c1c
- https://community.ui.com/releases/9f698d0b-8279-40d3-9f1a-d36db4813124
- https://community.ui.com/releases/Security-Advisory-Bulletin-003-003/982bbaa8-2a07-4f81-a5f6-0bb84753f391
- https://hackerone.com/reports/519582