Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Ubiquiti UniFi Protect Camera Vulnerability Allows Remote Code Execution

Posted on May 8, 2025May 8, 2025 By CWS

A important safety vulnerability in Ubiquiti UniFi Shield Cameras might permit attackers to execute arbitrary code remotely. 

The flaw, which acquired the very best attainable CVSS rating of 10.0, impacts all digital camera firmware variations 4.75.43 and earlier, prompting an pressing name for customers to replace their techniques instantly.

The vulnerability, tracked as CVE-2025-23123, includes a heap buffer overflow within the digital camera firmware that permits distant code execution (RCE) capabilities. 

Vital RCE in UniFi Shield Cameras

In line with the Safety Advisory Bulletin launched by Ubiquiti, “A malicious actor with entry to the administration community might execute a distant code execution (RCE) by exploiting a heap buffer overflow vulnerability within the UniFi Shield Cameras.”

Safety researchers observe that reaching an ideal CVSS rating of 10.0 is uncommon, highlighting the important nature of this vulnerability. 

The whole CVSS vector – CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H – signifies that the vulnerability requires no consumer interplay to use, could be accessed by way of the community, and will result in full system compromise.

The heap buffer overflow vulnerability might permit attackers who acquire entry to the administration community to probably:

Acquire full management over digital camera techniques

Listen in on surveillance feeds

Manipulate video recordings or stay footage

Use compromised cameras as entry factors to pivot deeper into secured networks

Safety knowledgeable Mathew Marcus, who found the vulnerability, emphasised that whereas attackers want entry to the administration community, many residence and small enterprise deployments lack correct community segmentation, making exploitation comparatively simple in non-segmented environments.

Danger FactorsDetailsAffected ProductsUniFi Shield Cameras (Model 4.75.43 and earlier)ImpactRemote Code Execution (RCE)Exploit PrerequisitesAccess to administration community; no privileges or consumer interplay requiredCVSS 3.1 Score10.0 (Vital)

Mitigation Steps

Ubiquiti strongly urges all UniFi Shield Digital camera customers to instantly replace to firmware model 4.75.62 or later to handle the vulnerability. The replace is obtainable by way of the usual UniFi firmware replace course of.

In the identical safety advisory, Ubiquiti additionally disclosed a second, much less important vulnerability (CVE-2025-23164) affecting the UniFi Shield Software variations 5.3.41 and earlier. 

This secondary subject includes a misconfigured entry token mechanism that might permit continued entry to livestream feeds even after hyperlinks have been disabled. 

To handle this subject, customers ought to replace the UniFi Shield Software to model 5.3.45 or later.

This isn’t the primary high-severity vulnerability found in Ubiquiti’s UniFi Shield ecosystem in current months. Earlier this 12 months, safety researchers recognized different important flaws, together with CVE-2025-23115 and CVE-2025-23116, which additionally affected the digital camera techniques

Organizations utilizing UniFi Shield cameras implement correct community segmentation as an extra safety measure to restrict the potential impression of such vulnerabilities, even after making use of the required firmware updates.

Setting Up SOC Crew? – Obtain Free Final SIEM Pricing Information (PDF) For Your SOC Crew -> Free Obtain

Cyber Security News Tags:Camera, Code, Execution, Protect, Remote, Ubiquiti, UniFi, Vulnerability

Post navigation

Previous Post: Microsoft Bookings Vulnerability Let Attackers Alter the Meeting Details
Next Post: IXON VPN Client Vulnerability Let Attackers Escalate Privileges

Related Posts

Cisco AnyConnect VPN Server Vulnerability Let Attackers Trigger DoS Attack Cyber Security News
How to Conduct a Secure Code Review Cyber Security News
Gonjeshke Darande Threat Actors Pose as Hacktivist Infiltrated Iranian Crypto Exchange Cyber Security News
UAC-0001 Hackers Attacking ICS Devices Running Windows Systems as a Server Cyber Security News
Windows Remote Desktop Gateway UAF Vulnerability Allows Remote Code Execution Cyber Security News
\Logicube’s Falcon®-NEO2 Forensic Imager Achieves Project VIC Validation; Now VICS Data Compliant Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Your AI Agents Might Be Leaking Data — Watch this Webinar to Learn How to Stop It
  • Google Ordered to Pay $314M for Misusing Android Users’ Cellular Data Without Permission
  • New Hpingbot Abusing Pastebin for Payload Delivery and Hping3 Tool to Launch DDoS Attacks
  • Azure API Vulnerabilities Leak VPN Keys and Built-In Roles Allow Over-Privileged Access
  • How to Identify and Avoid Tech Support Scams

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News