9.8
CVE-2023-38034
- EPSS 2.74%
- Published 10.08.2023 19:15:09
- Last modified 21.11.2024 08:12:43
- Source support@hackerone.com
- Teams watchlist Login
- Open Login
A command injection vulnerability in the DHCP Client function of all UniFi Access Points and Switches, excluding the Switch Flex Mini, could allow a Remote Code Execution (RCE). Affected Products: All UniFi Access Points (Version 6.5.53 and earlier) All UniFi Switches (Version 6.5.32 and earlier) -USW Flex Mini excluded. Mitigation: Update UniFi Access Points to Version 6.5.62 or later. Update UniFi Switches to Version 6.5.59 or later.
Data is provided by the National Vulnerability Database (NVD)
Ui ≫ Unifi Uap Firmware Version <= 6.5.53
Ui ≫ U6+ Version-
Ui ≫ U6-enterprise Version-
Ui ≫ U6-enterprise-iw Version-
Ui ≫ U6-extender Version-
Ui ≫ U6-iw Version-
Ui ≫ U6-lite Version-
Ui ≫ U6-lr Version-
Ui ≫ U6-mesh Version-
Ui ≫ U6-pro Version-
Ui ≫ Uap-ac-iw Version-
Ui ≫ Uap-ac-lite Version-
Ui ≫ Uap-ac-lr Version-
Ui ≫ Uap-ac-m Version-
Ui ≫ Uap-ac-m-pro Version-
Ui ≫ Uap-ac-pro Version-
Ui ≫ Ubb Version-
Ui ≫ Ubb-xg Version-
Ui ≫ Uwb-xg Version-
Ui ≫ U6-enterprise Version-
Ui ≫ U6-enterprise-iw Version-
Ui ≫ U6-extender Version-
Ui ≫ U6-iw Version-
Ui ≫ U6-lite Version-
Ui ≫ U6-lr Version-
Ui ≫ U6-mesh Version-
Ui ≫ U6-pro Version-
Ui ≫ Uap-ac-iw Version-
Ui ≫ Uap-ac-lite Version-
Ui ≫ Uap-ac-lr Version-
Ui ≫ Uap-ac-m Version-
Ui ≫ Uap-ac-m-pro Version-
Ui ≫ Uap-ac-pro Version-
Ui ≫ Ubb Version-
Ui ≫ Ubb-xg Version-
Ui ≫ Uwb-xg Version-
Ui ≫ Unifi Switch Firmware Version <= 6.5.32
Ui ≫ Us-16-150w Version-
Ui ≫ Us-24-250w Version-
Ui ≫ Us-48-500w Version-
Ui ≫ Us-8-150w Version-
Ui ≫ Us-8-60w Version-
Ui ≫ Us-xg-6poe Version-
Ui ≫ Usw-16-poe Version-
Ui ≫ Usw-24 Version-
Ui ≫ Usw-24-poe Version-
Ui ≫ Usw-48 Version-
Ui ≫ Usw-48-poe Version-
Ui ≫ Usw-aggregation Version-
Ui ≫ Usw-enterprise-24-poe Version-
Ui ≫ Usw-enterprise-48-poe Version-
Ui ≫ Usw-enterprise-8-poe Version-
Ui ≫ Usw-enterprisexg-24 Version-
Ui ≫ Usw-flex Version-
Ui ≫ Usw-flex-xg Version-
Ui ≫ Usw-industrial Version-
Ui ≫ Usw-lite-16-poe Version-
Ui ≫ Usw-lite-8-poe Version-
Ui ≫ Usw-mission-critical Version-
Ui ≫ Usw-pro-24 Version-
Ui ≫ Usw-pro-24-poe Version-
Ui ≫ Usw-pro-48 Version-
Ui ≫ Usw-pro-48-poe Version-
Ui ≫ Usw-pro-aggregation Version-
Ui ≫ Us-24-250w Version-
Ui ≫ Us-48-500w Version-
Ui ≫ Us-8-150w Version-
Ui ≫ Us-8-60w Version-
Ui ≫ Us-xg-6poe Version-
Ui ≫ Usw-16-poe Version-
Ui ≫ Usw-24 Version-
Ui ≫ Usw-24-poe Version-
Ui ≫ Usw-48 Version-
Ui ≫ Usw-48-poe Version-
Ui ≫ Usw-aggregation Version-
Ui ≫ Usw-enterprise-24-poe Version-
Ui ≫ Usw-enterprise-48-poe Version-
Ui ≫ Usw-enterprise-8-poe Version-
Ui ≫ Usw-enterprisexg-24 Version-
Ui ≫ Usw-flex Version-
Ui ≫ Usw-flex-xg Version-
Ui ≫ Usw-industrial Version-
Ui ≫ Usw-lite-16-poe Version-
Ui ≫ Usw-lite-8-poe Version-
Ui ≫ Usw-mission-critical Version-
Ui ≫ Usw-pro-24 Version-
Ui ≫ Usw-pro-24-poe Version-
Ui ≫ Usw-pro-48 Version-
Ui ≫ Usw-pro-48-poe Version-
Ui ≫ Usw-pro-aggregation Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 2.74% | 0.851 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
support@hackerone.com | 8.3 | 1.6 | 6 |
CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.