Ubiquiti reports critical command injection flaw in UniFi Access devices
Take action: If you have any computer network, make sure that the management network is isolated from the main corporate network. If you have Ubiquiti UniFi Access devices, plan a regular update cycle of the devices. If your management network isn't isolated, it's an urgent patch.
Learn More
Ubiquiti Networks is reporting a critical command injection vulnerability affecting multiple UniFi Access devices.
The vulnerability is tracked as CVE-2025-27212 (CVSS score 9.8) and allows authenticated attackers with access to the UniFi Access management network to execute arbitrary commands on vulnerable devices, potentially leading to complete compromise of access control systems. The vulnerability exploits inadequate input validation controls in the UniFi Access management network.
The vulnerability impacts six UniFi Access product lins:
- UniFi Access Reader Pro - Version 2.14.21 and earlier
- UniFi Access G2 Reader Pro - Version 1.10.32 and earlier
- UniFi Access G3 Reader Pro - Version 1.10.30 and earlier
- UniFi Access Intercom - Version 1.7.28 and earlier
- UniFi Access G3 Intercom - Version 1.7.29 and earlier
- UniFi Access Intercom Viewer - Version 1.3.20 and earlier
Ubiquiti has released firmware updates for all affected product lines:
- UniFi Access Reader Pro version 2.15.9 or later
- UniFi Access G2 Reader Pro version 1.11.23 or later
- UniFi Access G3 Reader Pro version 1.11.22 or later
- UniFi Access Intercom version 1.8.22 or later
- UniFi Access G3 Intercom version 1.8.22 or later
- UniFi Access Intercom Viewer version 1.4.39 or later
As a temporary mitigation measure, organizations should isolate the Access management networks from the rest of the corporate networks.