First published: Tue Jul 29 2014(Updated: )
Ubiquiti UniFi Controller before 3.2.1 logs the administrative password hash in syslog messages, which allows man-in-the-middle attackers to obtain sensitive information via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ubiquiti UniFi Controller | <=2.4.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2226 is classified as a medium severity vulnerability due to the potential exposure of sensitive information.
To fix CVE-2014-2226, upgrade Ubiquiti UniFi Controller to version 3.2.1 or later.
CVE-2014-2226 allows man-in-the-middle attackers to obtain the administrative password hash, compromising system security.
CVE-2014-2226 affects Ubiquiti UniFi Controller versions prior to 3.2.1, including all versions up to 2.4.6.
Yes, CVE-2014-2226 can be exploited remotely by attackers intercepting logs transmitted over a network.