CVE-2025-23117

6.8 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers on the same network as UniFi Protect Cameras to bypass firmware validation and make unauthorized system changes. It affects users of UniFi Protect Camera systems with insufficient update validation. Attackers must have network adjacency and authentication to exploit this flaw.

💻 Affected Systems

Products:
  • UniFi Protect Cameras
Versions: Specific versions not detailed in advisory; all versions before patched firmware
Operating Systems: Camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to be authenticated and on same network segment as cameras.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious actor could install backdoored firmware, gain persistent access, disable security features, or brick cameras completely.

🟠

Likely Case

Attacker modifies camera settings, disables recording, or tampers with firmware to bypass security controls.

🟢

If Mitigated

With proper network segmentation and authentication controls, impact is limited to isolated camera network segments.

🌐 Internet-Facing: LOW - Requires network adjacency and authentication, not directly internet exploitable.
🏢 Internal Only: MEDIUM - Requires authenticated access to internal network where cameras reside.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated network access and knowledge of camera systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Latest UniFi Protect firmware (check vendor advisory)

Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-046-046/9649ea8f-93db-4713-a875-c3fd7614943f

Restart Required: Yes

Instructions:

1. Log into UniFi Protect console 2. Navigate to camera settings 3. Check for firmware updates 4. Apply latest firmware 5. Reboot cameras after update

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera network from general corporate network

Access Control

all

Restrict authentication to camera management interface

🧯 If You Can't Patch

  • Segment camera network using VLANs or physical separation
  • Implement strict access controls and monitor for unauthorized configuration changes

🔍 How to Verify

Check if Vulnerable:

Check UniFi Protect console for camera firmware version and compare against latest patched version

Check Version:

Check via UniFi Protect web interface: Settings > Cameras > Firmware Version

Verify Fix Applied:

Confirm all cameras show latest firmware version in UniFi Protect console

📡 Detection & Monitoring

Log Indicators:

  • Unexpected firmware update attempts
  • Unauthorized configuration changes
  • Camera reboot events

Network Indicators:

  • Unusual traffic to camera management ports
  • Firmware download attempts from unauthorized sources

SIEM Query:

source="unifi-protect" AND (event_type="firmware_update" OR event_type="configuration_change")

🔗 References

📤 Share & Export