CVE-2019-25651 PUBLISHED

Ubiquiti UniFi Devices Use of AES-CBC Allows Key Recovery and Unauthorized Device Control

Assigner: VulnCheck
Reserved: 26.03.2026 Published: 27.03.2026 Updated: 27.03.2026

Ubiquiti UniFi Network Controller prior to 5.10.12 (excluding 5.6.42), UAP FW prior to 4.0.6, UAP-AC, UAP-AC v2, and UAP-AC Outdoor FW prior to 3.8.17, USW FW prior to 4.0.6, USG FW prior to 4.4.34 uses AES-CBC encryption for device-to-controller communication, which contains cryptographic weaknesses that allow attackers to recover encryption keys from captured traffic. Attackers with adjacent network access can capture sufficient encrypted traffic and exploit AES-CBC mode vulnerabilities to derive the encryption keys, enabling unauthorized control and management of network devices.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 8.7

Product Status

Vendor Ubiquiti
Product UniFi Network Controller
Versions Default: unaffected
  • affected from 0 to 5.10.12 (excl.)
  • Version 5.6.42 is unaffected
Vendor Ubiquiti
Product UniFi UAP Firmware
Versions Default: unaffected
  • affected from 0 to 4.0.6 (excl.)
Vendor Ubiquiti
Product UniFi UAP-AC Firmware
Versions Default: unaffected
  • affected from 0 to 3.8.17 (excl.)
Vendor Ubiquiti
Product UniFi USW Firmware
Versions Default: unaffected
  • affected from 0 to 4.0.6 (excl.)
Vendor Ubiquiti
Product UniFi USG Firmware
Versions Default: unaffected
  • affected from 0 to 4.4.34 (excl.)

References

Problem Types

  • CWE-327 Use of a Broken or Risky Cryptographic Algorithm CWE