Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities

Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities

Ubiquiti has rolled out critical security updates addressing three maximum severity vulnerabilities in UniFi OS. BleepingComputer reports these flaws, tracked as CVE-2023-48092, CVE-2023-48093, and CVE-2023-48094, could allow unauthenticated remote attackers to execute arbitrary code or gain root access on affected devices. This isn’t theoretical; the risk is direct and high.

The vulnerabilities impact various UniFi OS consoles, including Cloud Key Gen2 Plus, UDM Pro, UDM SE, UDW, and UDR, running versions earlier than 3.2.12. The attacker’s calculus here is simple: these are widely deployed network management devices. Gaining control provides a beachhead into the entire network infrastructure, offering persistent access and the ability to pivot to other critical systems.

For defenders, this is a clear call to action. Ubiquiti devices are often set-and-forget, but they are prime targets due to their network-level access. Unauthenticated remote code execution is the worst-case scenario. Patching is non-negotiable and immediate. Don’t assume your network edge is secure just because it’s a ‘utility’ device.

What This Means For You

  • If your organization uses any Ubiquiti UniFi OS consoles (Cloud Key Gen2 Plus, UDM Pro, UDM SE, UDW, UDR), you must immediately confirm they are patched to version 3.2.12 or later. Prioritize this. Unauthenticated remote code execution on your network management infrastructure is a direct path to a full network compromise.

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.

high vulnerability event-type

Exploitation Attempt — Ubiquiti

Sigma YAML — free preview

Source: Shimi's Cyber World · License & reuse

✓ Sigma · Splunk SPL Sentinel KQL Elastic QRadar AQL Wazuh Get rules for your SIEM →

Indicators of Compromise

IDTypeIndicator
UniFi-OS-2024-05 RCE Ubiquiti UniFi OS
UniFi-OS-2024-05 Auth Bypass Ubiquiti UniFi OS
UniFi-OS-2024-05 Privilege Escalation Ubiquiti UniFi OS
Take action on this incident
📡 Monitor ui.com Free · 1 watchlist slot · instant alerts on new breaches 🔍 Threat intel on Ubiquiti All breaches, IOCs & vendor exposure

Related coverage on Ubiquiti

Ghostwriter Targets Ukraine Government with Prometheus Phishing

The Belarus-aligned threat actor, Ghostwriter (also tracked as UAC-0057 and UNC1151), is actively targeting Ukrainian government entities. According to The Hacker News, this group is...

threat-intelvulnerabilitymalwarephishing
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Huawei Router Flaw Triggered Telecom Blackout, SecurityWeek Reports

SecurityWeek reports on a critical flaw in Huawei routers that led to a significant telecom blackout. While details are sparse, the incident underscores the inherent...

threat-intelvulnerabilityidentity
/SCW Vulnerability Desk /MEDIUM /⚑ 3 IOCs /⚙ 3 Sigma

Trend Micro Apex One Zero-Day Under Active Exploitation

Trend Micro has confirmed a zero-day vulnerability in its Apex One security product, actively exploited on Windows systems. BleepingComputer reports that this critical flaw allows...

threat-inteldata-breachmalwarevulnerabilitymicrosoft
/SCW Vulnerability Desk /HIGH /⚑ 2 IOCs /⚙ 3 Sigma