A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE).
Affected Products:
All UniFi Access Points (Version 6.5.53 and earlier)
All UniFi Switches (Version 6.5.32 and earlier)
-USW Flex Mini excluded.
Mitigation:
Update UniFi Access Points to Version 6.5.62 or later.
Update UniFi Switches to Version 6.5.59 or later.
References
Link | Resource |
---|---|
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking Vendor Advisory |
https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 08:12
Type | Values Removed | Values Added |
---|---|---|
References | () https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 - Issue Tracking, Vendor Advisory |
17 Aug 2023, 14:42
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:ui:u6-lr:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-lite:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-m-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-flex:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-aggregation:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-lr:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-xg-6poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-lite-16-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-mission-critical:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-mesh:-:*:*:*:*:*:*:* cpe:2.3:o:ui:unifi_uap_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-enterprise-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-8-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-lite-8-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-16-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-16-150w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-8-150w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uwb-xg:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-48:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-m:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprisexg-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-extender:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6\+:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-48:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:ubb:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-24:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-enterprise-48-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-24-250w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-pro:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-industrial:-:*:*:*:*:*:*:* cpe:2.3:h:ui:u6-enterprise:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-lite:-:*:*:*:*:*:*:* cpe:2.3:o:ui:unifi_switch_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-24-poe:-:*:*:*:*:*:*:* cpe:2.3:h:ui:uap-ac-iw:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-flex-xg:-:*:*:*:*:*:*:* cpe:2.3:h:ui:usw-pro-aggregation:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-8-60w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:us-48-500w:-:*:*:*:*:*:*:* cpe:2.3:h:ui:ubb-xg:-:*:*:*:*:*:*:* |
|
First Time |
Ui usw-24-poe
Ui u6\+ Ui u6-extender Ui uap-ac-lr Ui usw-24 Ui usw-enterprisexg-24 Ui us-24-250w Ui usw-enterprise-48-poe Ui usw-lite-16-poe Ui usw-enterprise-8-poe Ui us-48-500w Ui usw-pro-24-poe Ui us-8-60w Ui u6-pro Ui u6-iw Ui u6-lr Ui us-8-150w Ui usw-enterprise-24-poe Ui uwb-xg Ui usw-pro-24 Ui usw-48 Ui u6-enterprise-iw Ui u6-enterprise Ui usw-aggregation Ui uap-ac-lite Ui usw-industrial Ui u6-lite Ui unifi Switch Firmware Ui usw-pro-48 Ui uap-ac-iw Ui usw-16-poe Ui Ui uap-ac-pro Ui usw-mission-critical Ui ubb Ui usw-flex-xg Ui uap-ac-m Ui usw-pro-aggregation Ui usw-flex Ui ubb-xg Ui usw-lite-8-poe Ui u6-mesh Ui us-16-150w Ui usw-48-poe Ui usw-pro-48-poe Ui us-xg-6poe Ui unifi Uap Firmware Ui uap-ac-m-pro |
|
CWE | CWE-77 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
References | (MISC) https://community.ui.com/releases/Security-Advisory-Bulletin-035-035/91107858-9884-44df-b1c6-63c6499f6e56 - Issue Tracking, Vendor Advisory |
10 Aug 2023, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-10 19:15
Updated : 2024-11-21 08:12
NVD link : CVE-2023-38034
Mitre link : CVE-2023-38034
CVE.ORG link : CVE-2023-38034
JSON object : View
Products Affected
ui
- usw-enterprise-24-poe
- usw-24
- us-16-150w
- u6-mesh
- uap-ac-iw
- usw-industrial
- u6-enterprise
- usw-48
- usw-lite-16-poe
- uap-ac-m-pro
- usw-enterprise-48-poe
- u6-iw
- u6-enterprise-iw
- usw-48-poe
- u6-lite
- ubb
- uwb-xg
- unifi_uap_firmware
- usw-aggregation
- usw-flex-xg
- us-8-60w
- usw-lite-8-poe
- unifi_switch_firmware
- us-8-150w
- usw-flex
- usw-pro-48-poe
- usw-16-poe
- usw-pro-24-poe
- u6-lr
- u6-extender
- usw-enterprisexg-24
- u6-pro
- uap-ac-lr
- usw-enterprise-8-poe
- usw-pro-aggregation
- us-24-250w
- uap-ac-pro
- usw-pro-48
- usw-mission-critical
- us-48-500w
- usw-pro-24
- usw-24-poe
- u6\+
- ubb-xg
- us-xg-6poe
- uap-ac-lite
- uap-ac-m
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')