CWE
209
Advisory Published
Updated

CVE-2020-8213

First published: Thu Jul 30 2020(Updated: )

An information exposure vulnerability exists in UniFi Protect before v1.13.4-beta.5 that allowed unauthenticated attackers access to valid usernames for the UniFi Protect web application via HTTP response code and response timing.

Credit: support@hackerone.com

Affected SoftwareAffected VersionHow to fix
Ui Unifi Protect<=1.13.3

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID for this information exposure vulnerability?

    The vulnerability ID is CVE-2020-8213.

  • What is the severity of CVE-2020-8213?

    The severity of CVE-2020-8213 is medium with a CVSS score of 5.3.

  • What is the affected software version for CVE-2020-8213?

    The affected software version for CVE-2020-8213 is UniFi Protect before v1.13.4-beta.5.

  • How can unauthenticated attackers exploit CVE-2020-8213?

    Unauthenticated attackers can exploit CVE-2020-8213 by gaining access to valid usernames for the UniFi Protect web application via HTTP response code and response timing.

  • Is there a fix available for CVE-2020-8213?

    Yes, a fix is available for CVE-2020-8213 in UniFi Protect v1.13.4-beta.5 and later versions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203