CVE-2021-22952
📋 TL;DR
This vulnerability allows an attacker who has already compromised a network to take control of UniFi Talk devices that haven't been adopted yet. It affects UniFi Talk application versions 1.12.3 and earlier. The attacker needs existing network access to exploit this weakness.
💻 Affected Systems
- Ubiquiti UniFi Talk
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of UniFi Talk devices allowing eavesdropping on conversations, call interception, and device repurposing for further attacks.
Likely Case
Unauthorized control of VoIP devices leading to privacy violations and potential use as footholds for lateral movement.
If Mitigated
Limited impact if devices are properly adopted and network access is restricted, though residual risk remains from initial network compromise.
🎯 Exploit Status
Requires existing network access but then provides straightforward device takeover of unadopted Talk devices.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.12.5 and later
Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-020-020/8ce6a7e6-0cce-4814-8bbe-ee812cb94b1a
Restart Required: Yes
Instructions:
1. Backup current configuration. 2. Update UniFi Talk application to version 1.12.5 or later. 3. Restart the application. 4. Verify all Talk devices are properly adopted.
🔧 Temporary Workarounds
Immediate device adoption
allAdopt all UniFi Talk devices immediately to prevent exploitation
Adopt devices through UniFi Controller interface
Network segmentation
allIsolate Talk devices on separate VLAN from general network
Configure VLAN segmentation in network settings
🧯 If You Can't Patch
- Adopt all Talk devices immediately through UniFi Controller
- Segment Talk devices on isolated network/VLAN with strict access controls
🔍 How to Verify
Check if Vulnerable:
Check UniFi Talk application version in controller interface - if version is 1.12.3 or earlier, you are vulnerable.
Check Version:
Check version in UniFi Controller web interface under Settings > Application
Verify Fix Applied:
Verify UniFi Talk application version is 1.12.5 or later and all Talk devices show as adopted in controller.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized device adoption attempts
- Unexpected Talk device configuration changes
- Network traffic from unadopted Talk devices
Network Indicators:
- Unusual traffic patterns from Talk devices
- Unauthorized control protocol communications
SIEM Query:
Search for: 'Talk device adoption' OR 'unauthorized device control' OR 'CVE-2021-22952' in UniFi logs