An integer overflow vulnerability in all UniFi Access Points and Switches, excluding the Switch Flex Mini, with SNMP Monitoring and default settings enabled could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.50 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update the UniFi Switches to Version 6.5.59 or later.
References
Link | Resource |
---|---|
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking Vendor Advisory |
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 08:07
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 - Issue Tracking, Vendor Advisory |
17 Aug 2023, 14:42
Type | Values Removed | Values Added |
---|---|---|
First Time |
Ui
Ui usw-enterprise-24-poe Ui usw-enterprisexg-24 Ui usw-pro-24-poe Ui us-48-500w Ui usw-aggregation Ui usw-flex Ui u6-pro Ui usw-industrial Ui uap-ac-m-pro Ui usw-enterprise-8-poe Ui us-8-150w Ui usw-pro-aggregation Ui u6-extender Ui uap-ac-pro Ui uap-ac-iw Ui usw-enterprise-48-poe Ui usw-lite-16-poe Ui usw-16-poe Ui usw-mission-critical Ui usw-pro-48-poe Ui u6-enterprise-iw Ui us-xg-6poe Ui us-16-150w Ui uap-ac-m Ui u6-lr Ui usw-48-poe Ui us-8-60w Ui uap-ac-lite Ui us-24-250w Ui usw-pro-24 Ui uwb-xg Ui unifi Switch Firmware Ui u6-iw Ui u6-lite Ui u6-enterprise Ui usw-pro-48 Ui unifi Uap Firmware Ui usw-lite-8-poe Ui usw-48 Ui ubb Ui usw-24 Ui usw-24-poe Ui u6\+ Ui ubb-xg Ui uap-ac-lr Ui u6-mesh Ui usw-flex-xg |
|
CWE | CWE-190 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 - Issue Tracking, Vendor Advisory | |
CPE | cpe:2.3:h:ui:ubb-xg:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprisexg-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-lr:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-flex-xg:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-lite:-:*:*:*:*:*:*:* cpe:2.3:h:ui:ubb:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-aggregation:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uwb-xg:-:*:*:*:*:*:*:* cpe:2.3:o:ui:unifi_uap_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-mesh:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-enterprise:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-flex:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-m-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-48-500w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-lr:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6\+:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-8-150w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-m:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-24-250w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-8-60w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-16-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-lite:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-lite-8-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-mission-critical:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-enterprise-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-16-150w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-xg-6poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-industrial:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-lite-16-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-extender:-:*:*:*:*:*:*:* cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-8-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-48:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-48:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-aggregation:-:*:*:*:*:*:*:* |
10 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-10 19:15
Updated : 2024-11-21 08:07
NVD link : CVE-2023-35085
Mitre link : CVE-2023-35085
CVE.ORG link : CVE-2023-35085
JSON object : View
Products Affected
ui
- u6-pro
- usw-enterprise-48-poe
- us-8-150w
- usw-48-poe
- usw-enterprise-24-poe
- u6-enterprise
- u6-lr
- u6-mesh
- usw-24-poe
- u6\+
- usw-enterprisexg-24
- usw-pro-24-poe
- uap-ac-pro
- usw-aggregation
- usw-flex-xg
- usw-lite-8-poe
- usw-flex
- usw-pro-aggregation
- usw-24
- us-16-150w
- us-xg-6poe
- usw-pro-48-poe
- uap-ac-lite
- ubb-xg
- usw-enterprise-8-poe
- uap-ac-m
- uap-ac-lr
- usw-lite-16-poe
- u6-extender
- ubb
- u6-enterprise-iw
- us-24-250w
- usw-16-poe
- usw-pro-24
- us-8-60w
- unifi_uap_firmware
- uap-ac-iw
- usw-48
- uwb-xg
- u6-lite
- uap-ac-m-pro
- u6-iw
- us-48-500w
- usw-mission-critical
- unifi_switch_firmware
- usw-industrial
- usw-pro-48
CWE
CWE-190
Integer Overflow or Wraparound