First published: Sat Feb 08 2020(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in Ubiquiti Networks UniFi Controller before 3.2.1 allow remote attackers to hijack the authentication of administrators for requests that (1) create a new admin user via a request to api/add/admin; (2) have unspecified impact via a request to api/add/wlanconf; change the guest (3) password, (4) authentication method, or (5) restricted subnets via a request to api/set/setting/guest_access; (6) block, (7) unblock, or (8) reconnect users by MAC address via a request to api/cmd/stamgr; change the syslog (9) server or (10) port via a request to api/set/setting/rsyslogd; (11) have unspecified impact via a request to api/set/setting/smtp; change the syslog (12) server, (13) port, or (14) authentication settings via a request to api/cmd/cfgmgr; or (15) change the Unifi Controller name via a request to api/set/setting/identity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ui Airvision Controller | <=2.1.3 | |
Ui Mfi Controller | <=2.0.15 | |
Ui Unifi Controller | <3.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2014-2225.
The severity level of CVE-2014-2225 is high (8.8).
CVE-2014-2225 is a vulnerability that allows remote attackers to hijack the authentication of administrators in Ubiquiti Networks UniFi Controller, enabling them to perform unauthorized actions.
Ubiquiti Networks UniFi Controller versions before 3.2.1, Ui Airvision Controller versions up to and including 2.1.3, and Ui Mfi Controller versions up to and including 2.0.15 are affected by CVE-2014-2225.
More information about CVE-2014-2225 can be found at the following references: [1] http://seclists.org/fulldisclosure/2014/Jul/126 [2] http://sethsec.blogspot.com/2014/07/cve-2014-2225.html