CVE-2025-27217

9.1 CRITICAL

📋 TL;DR

This Server-Side Request Forgery (SSRF) vulnerability in the UISP Application allows authenticated attackers to make unauthorized requests to internal systems and external networks. It affects organizations running vulnerable versions of UISP Application, potentially exposing internal services and infrastructure to attackers with certain permissions.

💻 Affected Systems

Products:
  • UISP Application
Versions: Versions before 2.4.220
Operating Systems: All supported platforms
Default Config Vulnerable: ⚠️ Yes
Notes: Requires attacker to have certain permissions within the UISP Application. The exact permission level needed is not specified in the advisory.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access internal services, exfiltrate sensitive data, pivot to other systems, or perform attacks against internal infrastructure using the UISP server as a proxy.

🟠

Likely Case

Unauthorized access to internal APIs, metadata services, or cloud instance metadata leading to credential theft and lateral movement within the network.

🟢

If Mitigated

Limited impact with proper network segmentation, egress filtering, and authentication controls preventing unauthorized access to sensitive internal resources.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with specific permissions. The vulnerability allows making requests outside the intended scope of the application.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.4.220

Vendor Advisory: https://community.ui.com/releases/UISP-Application-2-4-220/b428b276-c4a6-4b90-b97b-1860ff2bb46d

Restart Required: Yes

Instructions:

1. Backup current UISP configuration. 2. Download UISP Application version 2.4.220 from the official UI website. 3. Follow the upgrade instructions for your deployment method (Docker, bare metal, etc.). 4. Restart the UISP service after upgrade. 5. Verify the upgrade was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict outbound network access from UISP servers to only required destinations

Permission Restriction

all

Review and minimize user permissions within UISP Application to limit potential attackers

🧯 If You Can't Patch

  • Implement strict network egress filtering to prevent UISP servers from accessing internal services
  • Monitor for unusual outbound connections from UISP servers and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check UISP Application version in the web interface under Settings > System > About, or run 'docker ps' to check container version if using Docker deployment.

Check Version:

In UISP web interface: Settings > System > About, or for Docker: docker ps --filter "name=uisp" --format "table {{.Image}}\t{{.Names}}"

Verify Fix Applied:

Verify version shows 2.4.220 or higher in the UISP web interface, and test that SSRF functionality is properly restricted.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from UISP server
  • Requests to internal IP ranges or metadata services
  • Multiple failed authentication attempts followed by SSRF-like requests

Network Indicators:

  • UISP server making requests to unexpected internal services
  • Traffic to cloud metadata endpoints (169.254.169.254, etc.)
  • Outbound connections to non-standard ports

SIEM Query:

source="uisp" AND (dest_ip IN (RFC1918_RANGES) OR dest_ip="169.254.169.254") AND http_method IN ("GET","POST")

🔗 References

📤 Share & Export