EUVD-2025-19535

| CVE-2025-24292 MEDIUM
2025-06-29 [email protected]
6.8
CVSS 3.0
Share

CVSS VectorNVD

CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

4
patch_available
Apr 16, 2026 - 05:29 EUVD
9.2.87
Analysis Generated
Mar 16, 2026 - 01:15 vuln.today
EUVD ID Assigned
Mar 16, 2026 - 01:15 euvd
EUVD-2025-19535
CVE Published
Jun 29, 2025 - 20:15 nvd
MEDIUM 6.8

DescriptionNVD

A misconfigured query in UniFi Network (v9.1.120 and earlier) could allow users to authenticate to Enterprise WiFi or VPN Server (l2tp and OpenVPN) using a device’s MAC address from 802.1X or MAC Authentication, if both services are enabled and share the same RADIUS profile.

AnalysisAI

A misconfigured query in UniFi Network (v9.1.120 and earlier) could allow users to authenticate to Enterprise WiFi or VPN Server (l2tp and OpenVPN) using a device’s MAC address from 802.1X or MAC Authentication, if both services are enabled and share the same RADIUS profile.

Technical ContextAI

An authentication bypass vulnerability allows attackers to circumvent login mechanisms and gain unauthorized access without valid credentials. This vulnerability is classified as Improper Authentication (CWE-287).

RemediationAI

Implement robust authentication mechanisms. Use multi-factor authentication. Review authentication logic for bypass conditions. Remove default credentials.

Share

EUVD-2025-19535 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy