First published: Thu Feb 02 2023(Updated: )
The use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update makes Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier vulnerable to firmware modification attacks. An attacker can conduct a man-in-the-middle (MITM) attack to modify the new firmware image and bypass the checksum verification.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ui Af-2x Firmware | <3.2.2 | |
Ui Af-2x |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-23119 is a vulnerability in the Ubiquiti airFiber AF2X Radio firmware version 3.2.2 and earlier that makes it vulnerable to firmware modification attacks due to the use of the cyclic redundancy check (CRC) algorithm for integrity check during firmware update.
CVE-2023-23119 allows an attacker to conduct a man-in-the-middle (MITM) attack to modify the new firmware image during the firmware update process.
CVE-2023-23119 has a severity rating of 5.9, which is considered medium.
To mitigate CVE-2023-23119, update your Ubiquiti airFiber AF2X Radio firmware to version 3.2.3 or later that fixes this vulnerability.
Yes, Ubiquiti airFiber AF2X Radio firmware versions 3.2.2 and earlier are vulnerable to CVE-2023-23119.