Threat Advisory

Critical Command Injection Flaw in UniFi Access Devices

Threat: Vulnerability
Targeted Region: Global
Targeted Sector: Technology & IT
Criticality: Critical

EXECUTIVE SUMMARY:

A critical flaw affects several Ubiquiti UniFi Access devices that are commonly used in building entry and physical security setups. This issue, marked as CVE-2025-27212, is caused by weak input checks in the software, allowing attackers to inject harmful commands remotely. The weakness is scored 9.8 on the CVSS scale, showing that it can be easily misused without needing any special permissions or interaction. Attackers only need access to the network where these devices are installed. Once exploited, it can give control over the devices, putting surveillance and access systems at serious risk. Devices such as intercoms and reader panels from multiple UniFi product lines are impacted.

  • CVE-2025-27212: This flaw is due to missing proper checks on input data inside the management software for UniFi Access devices. Attackers who get network access can send commands that the system wrongly accepts as safe. Because no user interaction or login is needed, and the complexity to run this attack is low, this makes the flaw highly dangerous. Attackers can use this to fully take over the affected devices and disrupt or spy on physical access systems.

This vulnerability poses a severe risk to physical security systems, potentially allowing unauthorized access to building controls. Organizations must apply updates immediately and isolate affected devices if patching is delayed.

RECOMMENDATION:

We strongly recommend you update UniFi products to below versions:

  • UniFi Access Reader Pro to version 2.15.9 or later.
  • UniFi Access G2 Reader Pro to version 1.11.23 or later.
  • UniFi Access G3 Reader Pro to version 1.11.22 or later.
  • UniFi Access Intercom to version 1.8.22 or later.
  • UniFi Access G3 Intercom to version 1.8.22 or later.
  • UniFi Access Intercom Viewer to version 1.4.39 or later.

REFERENCES:

The following reports contain further technical details:

crossmenu