Ubiquiti UniFi Protect: Security vulnerability allows access to cameras

In the UniFi Protect Application, attackers can exploit vulnerabilities for unauthorized access to cameras and DoS attacks.

listen Print view
Security camera

(Image: TimmyTimTim/Shutterstock.com)

2 min. read

Ubiquiti is warning of security vulnerabilities in the UniFi Protect application. The vulnerabilities can allow attackers to gain unauthorized access to UniFi Protect cameras or cause the UniFi Protect application to restart. Updated software is available that fixes the bugs.

In a security advisory, Ubiquiti explains that two security vulnerabilities exist in the UniFi Protect Application. Due to a vulnerability in the discovery protocol in the UniFi Protect Application, attackers from the adjacent network can gain unauthorized access to UniFi Protect cameras (CVE-2026-21633, CVSS 8.8, risk “high”). However, Ubiquiti does not provide details about the vulnerability or how attacks might look. Malicious actors can also flood the discovery protocol of the UniFi Protect Application from the neighboring network and provoke an app restart (CVE-2026-21634, CVSS 6.5, risk “medium”). Here too, further information that would help admins detect attack attempts is missing.

Both vulnerabilities were discovered and reported by Trend Micro's Zero-Day Initiative (ZDI). Ubiquiti has released the update to UniFi Protect Application 6.2.72, which is intended to correct the security-relevant errors. However, the overview of improvements and bug fixes in version 6.2.72 does not yet mention any of the security vulnerabilities closed by it. IT administrators who have so far refrained from updating should do so quickly -- after all, the first vulnerability narrowly misses being classified as a critical risk.

Videos by heise

At the end of October, Ubiquiti even had to close a security vulnerability with a “critical” risk rating in UniFi Access. The impact was unclear due to the vague description, but it allowed unauthorized access to an API.

(dmk)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.