Description
Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW prior to 4.0.6, UAP-AC, UAP-AC v2, and UAP-AC Outdoor FW prior to 3.8.17, USW FW prior to 4.0.6, USG FW prior to 4.4.34 uses AES-CBC encryption for device-to-controller communication, which contains cryptographic weaknesses that allow attackers to recover encryption keys from captured traffic. Attackers with adjacent network access can capture sufficient encrypted traffic and exploit AES-CBC mode vulnerabilities to derive the encryption keys, enabling unauthorized control and management of network devices.
Published: 2026-03-27
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized control of UniFi network devices via recovered AES keys
Action: Immediate Patch
AI Analysis

Impact

A critical cryptographic flaw in Ubiquiti UniFi devices allows attackers to recover AES-CBC keys that protect device-to-controller traffic. By capturing sufficient encrypted packets on the same network segment, an attacker can derive the keys and gain full control of the affected devices. This enables unauthorized configuration changes, firmware updates, or other management actions, effectively compromising the integrity of the network infrastructure.

Affected Systems

The vulnerability impacts Ubiquiti UniFi Network Controller Software versions before 5.10.12 (excluding 5.6.42), Ubiquiti UniFi UAP firmware before 4.0.6, UniFi UAP-AC and UAP-AC v2 firmware before 3.8.17, UniFi USG firmware before 4.4.34, and UniFi USW firmware before 4.0.6. Systems with these firmware releases are at risk until patched.

Risk and Exploitability

The CVSS base score of 8.7 indicates a high severity vulnerability. Although the EPSS score is not available, the absence of the flaw from the KEV catalog suggests it has not yet been widely exploited in the wild, yet the attack requires only adjacent network access and traffic capture, making it relatively straightforward for an attacker. The compromise grants full administrative control over the devices, representing a significant threat to network security.

Generated by OpenCVE AI on March 28, 2026 at 05:12 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the UniFi Network Controller to version 5.10.12 or later.
  • Upgrade all UniFi UAP and UAP-AC devices to firmware 4.0.6 or later; upgrade USG to 4.4.34 or later; upgrade USW to 4.0.6 or later.
  • If immediate firmware upgrade is not feasible, isolate the devices from adjacent network traffic and restrict eavesdropping.

Generated by OpenCVE AI on March 28, 2026 at 05:12 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 30 Mar 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Ubiquiti
Ubiquiti unifi Uap-ac Firmware
Ubiquiti unifi Uap Firmware
Ubiquiti unifi Usg Firmware
Ubiquiti unifi Usw Firmware
Vendors & Products Ubiquiti
Ubiquiti unifi Uap-ac Firmware
Ubiquiti unifi Uap Firmware
Ubiquiti unifi Usg Firmware
Ubiquiti unifi Usw Firmware

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Description Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW prior to 4.0.6, UAP-AC, UAP-AC v2, and UAP-AC Outdoor FW prior to 3.8.17, USW FW prior to 4.0.6, USG FW prior to 4.4.34 uses AES-CBC encryption for device-to-controller communication, which contains cryptographic weaknesses that allow attackers to recover encryption keys from captured traffic. Attackers with adjacent network access can capture sufficient encrypted traffic and exploit AES-CBC mode vulnerabilities to derive the encryption keys, enabling unauthorized control and management of network devices.
Title Ubiquiti UniFi Devices Use of AES-CBC Allows Key Recovery and Unauthorized Device Control
Weaknesses CWE-327
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


Subscriptions

Ubiquiti Unifi Uap-ac Firmware Unifi Uap Firmware Unifi Usg Firmware Unifi Usw Firmware
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-30T17:55:00.222Z

Reserved: 2026-03-26T20:24:49.635Z

Link: CVE-2019-25651

cve-icon Vulnrichment

Updated: 2026-03-30T17:51:14.240Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-27T22:16:19.107

Modified: 2026-03-30T13:26:07.647

Link: CVE-2019-25651

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T07:59:19Z

Weaknesses