Ubiquiti’s Unifi Network Server, part of the UniFi platform, is currently affected by an 8.8 out of 10 vulnerability, which attackers can exploit to elevate their privileges.
Ubiquiti released a security advisory bulletin announcing a local privilege escalation vulnerability was discovered in a self-hosted UniFi network server with a UniFi network application.
UniFi Network is used for real-time traffic dashboards, visual topology maps, and network optimization. This application is part of the UniFi ecosystem, a popular and scalable platform for managing access points, switches, and IoT devices, such as security cameras, VoIP phones, door access, and more.
The discovered bug “allows a malicious actor with a local operational system user to execute high privilege actions on the UniFi Network Server,” the company warns.
This means that anyone with local access, such as employees, contractors, or someone who gained initial access through exploited other vulnerabilities, can weaponize the bug to take control of the network server.
The affected versions include 8.4.62 and earlier. Updating the application to Version 8.5.6 or later mitigates the issue. IT managers with self-hosted Unifi Network servers should promptly download and install the update.
Ubiquiti reserved the CVE-2024-42028 identifier for the vulnerability, as observed by Heise.de.