First published: Tue Jul 09 2024(Updated: )
UniFi iOS app 10.15.0 introduces a misconfiguration on 2nd Generation UniFi Access Points configured as standalone (not using UniFi Network Application) that could cause the SSID name to change and/or the WiFi Password to be removed on the 5GHz Radio. This vulnerability is fixed in UniFi iOS app 10.15.2 and later.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ubiquiti UniFi | >10.15.0<=10.15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-34786 is considered to have a medium severity due to its potential impact on network security.
To fix CVE-2024-34786, update the UniFi iOS app to version 10.15.2 or later.
CVE-2024-34786 affects the Ubiquiti UniFi iOS app version 10.15.0 to 10.15.1.
CVE-2024-34786 could cause unintended changes to the SSID name and removal of the WiFi Password on standalone 2nd Generation UniFi Access Points.
CVE-2024-34786 was disclosed in the release notes for the UniFi iOS app version 10.15.0.