CVE-2024-29206
May 7, 2024, 8:07 p.m.
2.2
Low
Description
An Improper Access Control could allow a malicious actor authenticated in the API to enable Android Debug Bridge (ADB) and make unsupported changes to the system.
Affected Products:
UniFi Connect EV Station (Version 1.1.18 and earlier)
UniFi Connect EV Station Pro (Version 1.1.18 and earlier)
UniFi Access G2 Reader Pro (Version 1.2.172 and earlier)
UniFi Access Reader Pro (Version 2.7.238 and earlier)
UniFi Access Intercom (Version 1.0.66 and earlier)
UniFi Access Intercom Viewer (Version 1.0.5 and earlier)
UniFi Connect Display (Version 1.9.324 and earlier)
UniFi Connect Display Cast (Version 1.6.225 and earlier)
Mitigation:
Update UniFi Connect Application to Version 3.10.7 or later.
Update UniFi Connect EV Station to Version 1.2.15 or later.
Update UniFi Connect EV Station Pro to Version 1.2.15 or later.
Update UniFi Access G2 Reader Pro Version 1.3.37 or later.
Update UniFi Access Reader Pro Version 2.8.19 or later.
Update UniFi Access Intercom Version 1.1.32 or later.
Update UniFi Access Intercom Viewer Version 1.1.6 or later.
Update UniFi Connect Display to Version 1.11.348 or later.
Update UniFi Connect Display Cast to Version 1.8.255 or later.
Product(s) Impacted
Product | Versions |
---|---|
UniFi Connect EV Station |
|
UniFi Connect EV Station Pro |
|
UniFi Access G2 Reader Pro |
|
UniFi Access Reader Pro |
|
UniFi Access Intercom |
|
UniFi Access Intercom Viewer |
|
UniFi Connect Display |
|
UniFi Connect Display Cast |
|
UniFi Connect EV Station |
|
UniFi Connect EV Station Pro |
|
UniFi Access G2 Reader Pro |
|
UniFi Access Reader Pro |
|
UniFi Access Intercom |
|
UniFi Access Intercom Viewer |
|
UniFi Connect Display |
|
UniFi Connect Display Cast |
|
Weaknesses
Common security weaknesses mapped to this vulnerability.
Tags
CVSS Score
CVSS Data - 3.0
- Attack Vector: NETWORK
- Attack Complexity: HIGH
- Privileges Required: HIGH
- Scope: UNCHANGED
- Confidentiality Impact: NONE
- Integrity Impact: LOW
- Availability Impact: NONE
CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
Timeline
Published: May 7, 2024, 5:15 p.m.
Last Modified: May 7, 2024, 8:07 p.m.
Last Modified: May 7, 2024, 8:07 p.m.
Status : Awaiting Analysis
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
support@hackerone.com
*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.