CVE-2025-52665
Published: 31 October 2025
Summary
CVE-2025-52665 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Ui Unifi Access. Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and IA-9 (Service Identification and Authentication).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the vulnerability by requiring timely flaw remediation through patching to UniFi Access version 4.0.21 or later.
Prevents exposure of management APIs without authentication by enforcing secure configuration settings for the UniFi Access application.
Requires the management API service to implement identification and authentication, directly addressing the missing authentication for critical functions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability exposes an unauthenticated management API accessible over the network (AV:N/PR:N), directly enabling exploitation of a public-facing or remotely accessible application as per T1190.
NVD Description
A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version…
more
4.0.21 and later. Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.
Deeper analysisAI
CVE-2025-52665 is a critical vulnerability (CVSS 10.0, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) classified under CWE-306 (Missing Authentication for Critical Function) in UniFi's door access application, UniFi Access. The flaw arises from a misconfiguration that exposes a management API without proper authentication, introduced in version 3.3.22 and affecting versions 3.3.22 through 3.4.31.
A malicious actor with access to the management network can exploit this vulnerability to interact with the unauthenticated management API. The attack requires low complexity, no user interaction or privileges, and enables high-impact consequences across confidentiality, integrity, and availability with a changed scope, potentially allowing full compromise of the affected application.
Ubiquiti's Security Advisory Bulletin 056 recommends updating the UniFi Access Application to version 4.0.21 or later as the primary mitigation. Additional details are available at https://community.ui.com/releases/Security-Advisory-Bulletin-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191.
Details
- CWE(s)