CVE-2025-52663

7.3 HIGH

📋 TL;DR

This vulnerability allows attackers with access to the UniFi Talk management network to invoke internal debug operations through the device API due to unintentionally enabled debugging functionality. It affects UniFi Talk Touch, Touch Max, and G3 Phones running vulnerable firmware versions. The risk is limited to attackers who already have network access to the management interface.

💻 Affected Systems

Products:
  • UniFi Talk Touch
  • UniFi Talk Touch Max
  • UniFi Talk G3 Phones
Versions: UniFi Talk Touch: Version 1.21.16 and earlier, UniFi Talk Touch Max: Version 2.21.22 and earlier, UniFi Talk G3 Phones: Version 3.21.26 and earlier
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with vulnerable firmware versions. Requires access to the UniFi Talk management network.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could execute arbitrary debug commands, potentially gaining administrative control over the device, accessing sensitive configuration data, or disrupting phone services.

🟠

Likely Case

An attacker with management network access could use debug functions to gather system information, modify configurations, or cause service disruptions.

🟢

If Mitigated

With proper network segmentation and access controls, the impact is minimal as attackers cannot reach the management interface.

🌐 Internet-Facing: LOW - The vulnerability requires access to the management network, which should not be internet-facing.
🏢 Internal Only: MEDIUM - Attackers with internal network access to the management interface could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW - Requires network access but no authentication to the debug API.

Exploitation requires network-level access to the management interface. No authentication is needed for the debug functions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: UniFi Talk Touch: Version 1.21.17 or later, UniFi Talk Touch Max: Version 2.21.23 or later, UniFi Talk G3 Phones: Version 3.21.27 or later

Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-055-055/9b65527b-489c-4f16-ac34-2b887754db1e

Restart Required: Yes

Instructions:

1. Log into UniFi Network Controller. 2. Navigate to Devices section. 3. Select affected UniFi Talk devices. 4. Click 'Update' to apply latest firmware. 5. Devices will automatically restart after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate UniFi Talk management network from general user networks to prevent unauthorized access.

Access Control Lists

all

Implement firewall rules to restrict access to UniFi Talk management interfaces to authorized administrators only.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UniFi Talk management interfaces
  • Apply firewall rules to restrict access to UniFi Talk devices to authorized IP addresses only

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in UniFi Network Controller under Devices section for each UniFi Talk device.

Check Version:

No CLI command available. Check via UniFi Network Controller web interface.

Verify Fix Applied:

Confirm firmware version shows as patched version (1.21.17+, 2.21.23+, or 3.21.27+) in UniFi Network Controller.

📡 Detection & Monitoring

Log Indicators:

  • Unusual API calls to debug endpoints
  • Unexpected configuration changes
  • Unauthorized access attempts to management interface

Network Indicators:

  • Traffic to UniFi Talk management ports from unauthorized sources
  • Unusual API request patterns to device management interfaces

SIEM Query:

source_ip NOT IN (authorized_admin_ips) AND dest_port IN (management_ports) AND protocol = http

🔗 References

📤 Share & Export