Description
A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart.


Affected Products:
UniFi Protect Application (Version 6.1.79 and earlier).

Mitigation:
Update your UniFi Protect Application to Version 6.2.72 or later.
Published: 2026-01-05
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via Buffer Overflow
Action: Immediate Patch
AI Analysis

Impact

A buffer overflow exists in the UniFi Protect Application’s discovery protocol that, when triggered by a crafted packet, causes the application to reboot. This flaw exploits improper bounds checking (CWE‑119) and results in a loss of service rather than compromising data confidentiality or integrity.

Affected Systems

The vulnerability affects Ubiquiti Inc’s UniFi Protect Application running version 6.1.79 and all earlier releases. Users of this product should verify their deployment version to determine applicability.

Risk and Exploitability

The CVSS score of 6.5 reflects a moderate severity, while the EPSS score of less than 1 % indicates a very low likelihood of exploitation in the wild. The flaw is not listed in the CISA KEV catalog, suggesting no publicly known exploit activity. The attacker must be on the same local network or have sufficient network proximity to send the malformed discovery packet, making the attack vector likely to be adjacent network access.

Generated by OpenCVE AI on April 18, 2026 at 16:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade UniFi Protect to at least version 6.2.72 to remove the overflow flaw.
  • Restrict network access to the UniFi Protect environment by implementing VLAN segmentation or firewall rules that block discovery traffic from adjacent networks.
  • Monitor system logs for repeated discovery attempts and review network traffic for abnormal patterns that could indicate exploitation attempts.

Generated by OpenCVE AI on April 18, 2026 at 16:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 18 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in UniFi Protect Discovery Protocol Causes Application Restart

Fri, 30 Jan 2026 01:30:00 +0000

Type Values Removed Values Added
First Time appeared Ui
Ui unifi Protect
CPEs cpe:2.3:a:ui:unifi_protect:*:*:*:*:*:*:*:*
Vendors & Products Ui
Ui unifi Protect

Tue, 06 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
First Time appeared Ubiquiti
Ubiquiti protect Application
Vendors & Products Ubiquiti
Ubiquiti protect Application

Tue, 06 Jan 2026 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 05 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-119

Mon, 05 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description A malicious actor with access to the adjacent network could overflow the UniFi Protect Application (Version 6.1.79 and earlier) discovery protocol causing it to restart. Affected Products: UniFi Protect Application (Version 6.1.79 and earlier). Mitigation: Update your UniFi Protect Application to Version 6.2.72 or later.
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

Ubiquiti Protect Application
Ui Unifi Protect
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2026-01-05T20:42:08.706Z

Reserved: 2026-01-01T15:00:02.338Z

Link: CVE-2026-21634

cve-icon Vulnrichment

Updated: 2026-01-05T20:41:58.555Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-05T17:15:47.243

Modified: 2026-01-30T01:23:13.440

Link: CVE-2026-21634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T17:00:05Z

Weaknesses