Ubiquiti Patches Three Max Severity UniFi OS Vulnerabilities
Ubiquiti has rolled out critical security updates addressing three maximum severity vulnerabilities in UniFi OS. BleepingComputer reports these flaws, tracked as CVE-2023-48092, CVE-2023-48093, and CVE-2023-48094, could allow unauthenticated remote attackers to execute arbitrary code or gain root access on affected devices. This isn’t theoretical; the risk is direct and high.
The vulnerabilities impact various UniFi OS consoles, including Cloud Key Gen2 Plus, UDM Pro, UDM SE, UDW, and UDR, running versions earlier than 3.2.12. The attacker’s calculus here is simple: these are widely deployed network management devices. Gaining control provides a beachhead into the entire network infrastructure, offering persistent access and the ability to pivot to other critical systems.
For defenders, this is a clear call to action. Ubiquiti devices are often set-and-forget, but they are prime targets due to their network-level access. Unauthenticated remote code execution is the worst-case scenario. Patching is non-negotiable and immediate. Don’t assume your network edge is secure just because it’s a ‘utility’ device.
What This Means For You
- If your organization uses any Ubiquiti UniFi OS consoles (Cloud Key Gen2 Plus, UDM Pro, UDM SE, UDW, UDR), you must immediately confirm they are patched to version 3.2.12 or later. Prioritize this. Unauthenticated remote code execution on your network management infrastructure is a direct path to a full network compromise.
🛡️ Detection Rules
1 rule · 6 SIEM formats1 detection rule auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
Exploitation Attempt — Ubiquiti
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| UniFi-OS-2024-05 | RCE | Ubiquiti UniFi OS |
| UniFi-OS-2024-05 | Auth Bypass | Ubiquiti UniFi OS |
| UniFi-OS-2024-05 | Privilege Escalation | Ubiquiti UniFi OS |