Refine your search
1 vulnerability found for UniFi Access G3 Reader Pro by Ubiquiti Inc
CVE-2025-27212 (GCVE-0-2025-27212)
Vulnerability from cvelistv5
Published
2025-08-04 22:12
Modified
2025-08-05 13:33
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.
Affected Products:
UniFi Access Reader Pro (Version 2.14.21 and earlier)
UniFi Access G2 Reader Pro (Version 1.10.32 and earlier)
UniFi Access G3 Reader Pro (Version 1.10.30 and earlier)
UniFi Access Intercom (Version 1.7.28 and earlier)
UniFi Access G3 Intercom (Version 1.7.29 and earlier)
UniFi Access Intercom Viewer (Version 1.3.20 and earlier)
Mitigation:
Update UniFi Access Reader Pro Version 2.15.9 or later
Update UniFi Access G2 Reader Pro Version 1.11.23 or later
Update UniFi Access G3 Reader Pro Version 1.11.22 or later
Update UniFi Access Intercom Version 1.8.22 or later
Update UniFi Access G3 Intercom Version 1.8.22 or later
Update UniFi Access Intercom Viewer Version 1.4.39 or later
References
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Ubiquiti Inc | UniFi Access Reader Pro |
Version: 2.15.9 ≤ |
|||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-27212",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-05T13:29:55.643740Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-20",
"description": "CWE-20 Improper Input Validation",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-77",
"description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-05T13:33:09.184Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "UniFi Access Reader Pro",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "2.15.9",
"status": "affected",
"version": "2.15.9",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Access G2 Reader Pro",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "1.11.23",
"status": "affected",
"version": "1.11.23",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Access G3 Reader Pro",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "1.11.22",
"status": "affected",
"version": "1.11.22",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Access Intercom",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "1.8.22",
"status": "affected",
"version": "1.8.22",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Access G3 Intercom",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "1.8.22",
"status": "affected",
"version": "1.8.22",
"versionType": "semver"
}
]
},
{
"defaultStatus": "unaffected",
"product": "UniFi Access Intercom Viewer",
"vendor": "Ubiquiti Inc",
"versions": [
{
"lessThan": "1.4.39",
"status": "affected",
"version": "1.4.39",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An Improper Input Validation in certain UniFi Access devices could allow a Command Injection by a malicious actor with access to UniFi Access management network.\r\n\r\n \r\n\r\nAffected Products:\r\nUniFi Access Reader Pro (Version 2.14.21 and earlier)\r\nUniFi Access G2 Reader Pro (Version 1.10.32 and earlier)\r\nUniFi Access G3 Reader Pro (Version 1.10.30 and earlier)\r\nUniFi Access Intercom (Version 1.7.28 and earlier)\r\nUniFi Access G3 Intercom (Version 1.7.29 and earlier)\r\nUniFi Access Intercom Viewer (Version 1.3.20 and earlier)\r\n\r\n \r\n\r\nMitigation:\r\nUpdate UniFi Access Reader Pro Version 2.15.9 or later\r\nUpdate UniFi Access G2 Reader Pro Version 1.11.23 or later\r\nUpdate UniFi Access G3 Reader Pro Version 1.11.22 or later\r\nUpdate UniFi Access Intercom Version 1.8.22 or later\r\nUpdate UniFi Access G3 Intercom Version 1.8.22 or later\r\nUpdate UniFi Access Intercom Viewer Version 1.4.39 or later"
}
],
"providerMetadata": {
"dateUpdated": "2025-08-04T22:12:18.820Z",
"orgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"shortName": "hackerone"
},
"references": [
{
"url": "https://community.ui.com/releases/Security-Advisory-Bulletin-051-051/583fa6e1-3d85-42ec-a453-651d1653c9b3"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "36234546-b8fa-4601-9d6f-f4e334aa8ea1",
"assignerShortName": "hackerone",
"cveId": "CVE-2025-27212",
"datePublished": "2025-08-04T22:12:18.820Z",
"dateReserved": "2025-02-20T01:00:01.799Z",
"dateUpdated": "2025-08-05T13:33:09.184Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}