CVE-2020-8188

8.8 HIGH

📋 TL;DR

CVE-2020-8188 is a privilege escalation vulnerability in UniFi Protect firmware where users with 'view only' permissions can execute custom commands to assign themselves unauthorized administrative roles. This affects UniFi Cloud Key Gen2 Plus and UniFi Dream Machine Pro/UNVR devices running vulnerable firmware versions.

💻 Affected Systems

Products:
  • UniFi Cloud Key Gen2 Plus
  • UniFi Dream Machine Pro
  • UniFi Network Video Recorder (UNVR)
Versions: UniFi Protect firmware v1.13.2, v1.14.9 and prior
Operating Systems: Ubiquiti proprietary firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with UniFi Protect enabled and configured with view-only users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers with view-only access gain full administrative control over the UniFi Protect system, allowing them to modify configurations, access all video feeds, add/remove users, and potentially compromise the entire network.

🟠

Likely Case

Malicious insiders or compromised view-only accounts escalate privileges to administrative roles, gaining unauthorized access to surveillance systems and network management functions.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to unauthorized role changes that can be detected and reversed before significant damage occurs.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with view-only permissions. No public exploit code has been released.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UniFi Protect v1.13.3 for Cloud Key Gen2 Plus, v1.14.10 for Dream Machine Pro/UNVR

Vendor Advisory: https://community.ui.com/releases/Security-advisory-bulletin-012-012/1bba9134-f888-4010-81c0-b0dd53b9bda4

Restart Required: Yes

Instructions:

1. Log into UniFi Protect web interface. 2. Navigate to Settings > System > Updates. 3. Check for available updates. 4. Apply UniFi Protect firmware update to v1.13.3 or v1.14.10. 5. System will automatically restart after update.

🔧 Temporary Workarounds

Remove view-only user accounts

all

Temporarily remove all view-only user accounts until patching can be completed.

Restrict network access

all

Limit access to UniFi Protect interface to trusted networks only using firewall rules.

🧯 If You Can't Patch

  • Remove all view-only user accounts and use only administrative accounts
  • Implement network segmentation to isolate UniFi Protect devices from untrusted networks

🔍 How to Verify

Check if Vulnerable:

Check UniFi Protect firmware version in web interface: Settings > System > Updates. If version is v1.13.2 or earlier for Cloud Key Gen2 Plus, or v1.14.9 or earlier for Dream Machine Pro/UNVR, system is vulnerable.

Check Version:

No CLI command available. Check via web interface: Settings > System > Updates

Verify Fix Applied:

After updating, verify firmware version shows v1.13.3 or higher for Cloud Key Gen2 Plus, or v1.14.10 or higher for Dream Machine Pro/UNVR.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user role changes
  • View-only users executing administrative commands
  • Multiple failed login attempts followed by successful privilege escalation

Network Indicators:

  • Unusual API calls from view-only user accounts
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="unifi-protect" AND (event_type="user_role_change" OR command_execution="true") AND user_role="view_only"

🔗 References

📤 Share & Export