CVE-2021-22882

7.5 HIGH

📋 TL;DR

This vulnerability allows attackers to spoof camera devices and send malicious data to UniFi Protect controllers, causing denial-of-service crashes. It affects UniFi Protect network video recorder systems running vulnerable versions. Organizations using UniFi Protect for security camera management are at risk.

💻 Affected Systems

Products:
  • Ubiquiti UniFi Protect
Versions: All versions before v1.17.1
Operating Systems: Ubiquiti's custom OS on UniFi Protect appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Affects UniFi Protect Network Video Recorder (NVR) appliances and software installations managing UniFi cameras.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Continuous DoS attacks could render the UniFi Protect controller completely unavailable, disrupting all camera monitoring and recording functions for extended periods.

🟠

Likely Case

Intermittent controller crashes requiring manual restarts, causing temporary loss of camera feeds and recording gaps during security incidents.

🟢

If Mitigated

With proper network segmentation and updated software, impact is limited to isolated network segments with minimal disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the UniFi Protect controller but no authentication. Attack tools for spoofing cameras are publicly available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v1.17.1 and later

Vendor Advisory: https://community.ui.com/releases/Security-advisory-bulletin-017-017/071141e5-bc2e-4b71-81f3-5e499316fcee

Restart Required: Yes

Instructions:

1. Log into UniFi Protect web interface
2. Navigate to Settings > Updates
3. Check for available updates
4. Install v1.17.1 or later
5. System will automatically restart after update

🔧 Temporary Workarounds

Network Segmentation

all

Isolate UniFi Protect controller on separate VLAN with strict firewall rules limiting camera communication

Access Control Lists

all

Implement ACLs to restrict which IP addresses can communicate with UniFi Protect controller

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UniFi Protect controller from untrusted networks
  • Deploy network monitoring to detect spoofed camera traffic patterns and block malicious IPs

🔍 How to Verify

Check if Vulnerable:

Check UniFi Protect version in web interface under Settings > Updates. If version is below 1.17.1, system is vulnerable.

Check Version:

No CLI command available. Must check via UniFi Protect web interface.

Verify Fix Applied:

After updating, verify version shows 1.17.1 or higher in Settings > Updates. Test camera connectivity remains functional.

📡 Detection & Monitoring

Log Indicators:

  • Unusual camera registration attempts
  • Controller crash/restart logs
  • Multiple failed camera authentication attempts from same source

Network Indicators:

  • Spoofed camera MAC addresses
  • Unusual UDP/TCP traffic to UniFi Protect ports from non-camera devices
  • High volume of camera registration packets

SIEM Query:

source="unifi-protect" AND (event_type="crash" OR event_type="restart") OR (camera_registration_failure > threshold)

🔗 References

📤 Share & Export