CVE-2025-24290

9.9 CRITICAL

📋 TL;DR

Multiple authenticated SQL injection vulnerabilities in UISP Application version 2.4.206 and earlier allow attackers with low-privilege accounts to execute arbitrary SQL commands. This could lead to privilege escalation, data theft, or complete system compromise. Organizations running vulnerable UISP versions are affected.

💻 Affected Systems

Products:
  • UISP Application
Versions: 2.4.206 and earlier
Operating Systems: Linux-based systems running UISP
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access, but even low-privilege accounts can exploit.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover: attacker gains administrative access, exfiltrates sensitive data, modifies configurations, or deploys ransomware.

🟠

Likely Case

Privilege escalation leading to unauthorized access to network management functions, customer data exposure, and potential lateral movement.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege access, and input validation are implemented.

🌐 Internet-Facing: HIGH if UISP is exposed to the internet, as authenticated attackers could exploit from anywhere.
🏢 Internal Only: HIGH even internally, as low-privilege users could escalate to admin and compromise the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection vulnerabilities are well-understood and often easily weaponized once details are public.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.4.207 or later

Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-048-048/af007d99-bb6d-4368-a12f-75e84de19e8d

Restart Required: Yes

Instructions:

1. Backup UISP configuration and database. 2. Update UISP to version 2.4.207 or later via the admin interface or command line. 3. Restart UISP services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to UISP management interface to trusted IPs only.

iptables -A INPUT -p tcp --dport 443 -s TRUSTED_IP -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -j DROP

Least Privilege Access

all

Review and minimize low-privilege user accounts in UISP.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the UISP interface.
  • Monitor for unusual SQL queries or privilege escalation attempts in UISP logs.

🔍 How to Verify

Check if Vulnerable:

Check UISP version in admin interface or run: cat /usr/lib/uisp/version.txt

Check Version:

cat /usr/lib/uisp/version.txt

Verify Fix Applied:

Confirm version is 2.4.207 or later and test SQL injection attempts are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in UISP logs
  • Multiple failed login attempts followed by successful admin actions

Network Indicators:

  • Unexpected outbound connections from UISP server
  • SQL error messages in HTTP responses

SIEM Query:

source="uisp.log" AND ("sql" OR "injection" OR "privilege")

🔗 References

📤 Share & Export