CVE-2026-21633

8.8 HIGH

📋 TL;DR

An attacker on the same network can exploit a discovery protocol vulnerability in UniFi Protect Application to gain unauthorized access to UniFi Protect Cameras. This affects UniFi Protect Application versions 6.1.79 and earlier. The vulnerability allows network-adjacent attackers to bypass authentication mechanisms.

💻 Affected Systems

Products:
  • UniFi Protect Application
Versions: 6.1.79 and earlier
Operating Systems: All platforms running UniFi Protect Application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments with UniFi Protect Application version 6.1.79 or earlier, regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of UniFi Protect Cameras, allowing attackers to view camera feeds, manipulate camera settings, or use cameras as footholds for further network attacks.

🟠

Likely Case

Unauthorized access to camera feeds and potential manipulation of camera configurations by attackers on the same network segment.

🟢

If Mitigated

Limited to no impact if cameras are isolated on separate VLANs or network segments with proper segmentation.

🌐 Internet-Facing: LOW - The vulnerability requires network adjacency, not direct internet exposure.
🏢 Internal Only: HIGH - Attackers on the same network segment can exploit this without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network adjacency but no authentication, making it relatively simple for attackers on the same network.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.2.72 or later

Vendor Advisory: https://community.ui.com/releases/Security-Advisory-Bulletin-058-058/6922ff20-8cd7-4724-8d8c-676458a2d0f9

Restart Required: Yes

Instructions:

1. Log into UniFi Protect Application management interface. 2. Navigate to Settings > Updates. 3. Check for available updates. 4. Install version 6.2.72 or later. 5. Restart the application as prompted.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate UniFi Protect Cameras and application on separate VLANs or network segments to limit attack surface.

Access Control Lists

all

Implement network ACLs to restrict communication to UniFi Protect Application only from authorized management systems.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate UniFi Protect systems from other network segments
  • Deploy network monitoring and intrusion detection to detect unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check UniFi Protect Application version in the management interface under Settings > Updates.

Check Version:

Check via UniFi Protect web interface: Settings > Updates > Current Version

Verify Fix Applied:

Confirm version is 6.2.72 or later in the management interface and verify camera access requires proper authentication.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to UniFi Protect Application
  • Unexpected discovery protocol traffic from unauthorized sources

Network Indicators:

  • Unusual discovery protocol traffic patterns
  • Unauthorized network connections to UniFi Protect ports

SIEM Query:

source_ip NOT IN (authorized_management_ips) AND dest_port IN (7443, 7447) AND protocol=TCP

🔗 References

📤 Share & Export