Cyber Posture

CVE-2025-52665

Critical

Published: 31 October 2025

Published
31 October 2025
Modified
12 November 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.2329 96.0th percentile
Risk Priority 34 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-52665 is a critical-severity Missing Authentication for Critical Function (CWE-306) vulnerability in Ui Unifi Access. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 4.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-6 (Configuration Settings) and IA-9 (Service Identification and Authentication).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the vulnerability by requiring timely flaw remediation through patching to UniFi Access version 4.0.21 or later.

prevent

Prevents exposure of management APIs without authentication by enforcing secure configuration settings for the UniFi Access application.

prevent

Requires the management API service to implement identification and authentication, directly addressing the missing authentication for critical functions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability exposes an unauthenticated management API accessible over the network (AV:N/PR:N), directly enabling exploitation of a public-facing or remotely accessible application as per T1190.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A malicious actor with access to the management network could exploit a misconfiguration in UniFi’s door access application, UniFi Access, that exposed a management API without proper authentication. This vulnerability was introduced in Version 3.3.22 and was fixed in Version…

more

4.0.21 and later. Affected Products: UniFi Access Application (Version 3.3.22 through 3.4.31). Mitigation: Update your UniFi Access Application to Version 4.0.21 or later.

Deeper analysisAI

CVE-2025-52665 is a critical vulnerability (CVSS 10.0, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) classified under CWE-306 (Missing Authentication for Critical Function) in UniFi's door access application, UniFi Access. The flaw arises from a misconfiguration that exposes a management API without proper authentication, introduced in version 3.3.22 and affecting versions 3.3.22 through 3.4.31.

A malicious actor with access to the management network can exploit this vulnerability to interact with the unauthenticated management API. The attack requires low complexity, no user interaction or privileges, and enables high-impact consequences across confidentiality, integrity, and availability with a changed scope, potentially allowing full compromise of the affected application.

Ubiquiti's Security Advisory Bulletin 056 recommends updating the UniFi Access Application to version 4.0.21 or later as the primary mitigation. Additional details are available at https://community.ui.com/releases/Security-Advisory-Bulletin-056/ce97352d-91cd-40a7-a2f4-2c73b3b30191.

Details

CWE(s)

Affected Products

ui
unifi access
3.3.22 — 4.0.21

CVEs Like This One

CVE-2026-1453Shared CWE-306
CVE-2026-31882Shared CWE-306
CVE-2025-27642Shared CWE-306
CVE-2021-47891Shared CWE-306
CVE-2026-26340Shared CWE-306
CVE-2025-3498Shared CWE-306
CVE-2025-0355Shared CWE-306
CVE-2026-24177Shared CWE-306
CVE-2026-22207Shared CWE-306
CVE-2026-24124Shared CWE-306

References