First published: Tue Oct 27 2020(Updated: )
An issue was discovered on Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices. Cached credentials are not erased from an access point returning wirelessly from a disconnected state. This may provide unintended network access.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ui Unifi Meshing Access Point Firmware | =4.3.21.11325 | |
Ui Unifi Meshing Access Point | ||
Ui Unifi Controller Firmware | =6.0.28 | |
Ui Unifi Controller |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2020-27888 is high with a severity value of 7.5.
Ubiquiti UniFi Meshing Access Point UAP-AC-M 4.3.21.11325 and UniFi Controller 6.0.28 devices are affected by CVE-2020-27888.
Cached credentials are not erased from an access point returning wirelessly from a disconnected state, which may provide unintended network access.
There is currently no fix available for CVE-2020-27888. It is recommended to follow the vendor's security advisory for updates.
More information about CVE-2020-27888 can be found at the following reference: [link](https://community.ui.com/questions/Possible-authentication-bypass-for-access-into-LAN/7965adb2-5d70-4410-8467-4c7bec76bc00)