It's still a vulnerability. Don't try to throw any dirt on it. 



----- 
Mike Hammett 

Intelligent Computing Solutions 


Midwest Internet Exchange 


The Brothers WISP 

----- Original Message -----

From: "Matt Hoppes" <[email protected]> 
To: "Ubiquiti Users Group" <[email protected]> 
Sent: Tuesday, March 21, 2017 5:28:02 PM 
Subject: Re: [Ubnt_users] airOS Vulnerability Issue Update 

It is true... however to call it a vulnerability is a bit excessive. 

You literally have to be logged into a radio, while using an old 
browser, while browsing a shady site that specifically attacks your radio. 

On 3/21/17 4:12 PM, Eduardo wrote: 
> We got this notification from UBNT. Did anyone else also get it? 
> 
> Is this true, another vulnerability? 
> 
> Thanks, 
> Eduardo 
> 
> 
> 
> *From:*Ubiquiti Networks [mailto:[email protected]] 
> *Sent:* Monday, March 20, 2017 11:33 AM 
> *Subject:* airOS Vulnerability Issue Update 
> 
> 
> 
> Addressing Security Concerns. We take network security very seriously 
> and have fixed the command injection vulnerability for all affected 
> products: airMAX®, airGateway®, TOUGHSwitch™, and airFiber®...... 
> 
> Ubiquiti Networks 
> 
> 
> 
> SOFTWARE 
> 
> 
> 
> OPERATOR 
> 
> 
> 
> UNIFI 
> 
> 
> 
> CONSUMER 
> 
> 
> 
> PRODUCTS 
> 
> 
> 
> BUY 
> 
> 
> I M P O R T A N T 
> 
> 
> 
> 
> 
> 
> 
> 
> Addressing Security Concerns 
> 
> We take network security very seriously and have fixed the authenticated 
> command injection vulnerability for all affected products: airMAX®, 
> airGateway®, TOUGHSwitch™, and airFiber®; please upgrade the firmware 
> for your devices. UniFi®, EdgeMAX®, and AmpliFi™products are not affected. 
> 
> While we acknowledge that all vulnerabilities are serious, we believe 
> this issue rates fairly low in terms of threat severity, because it 
> requires being authenticated to the management web interface, or 
> tricking an authenticated administrator into opening a targeted, crafted 
> URL in the browser where they are logged in to the affected device. 
> Ubiquiti strongly backs our security measures: 
> 
> · Dedicated Security Director focused 100% on Ubiquiti®software 
> vulnerabilities and supported by a strong group of engineers 
> 
> 
> 
> · Participation in third-party vulnerability assessment programs 
> such as HackerOne, where we have given out substantial rewards 
> 
> 
> 
> · Significant investment retaining third-party external security 
> audit company to review our software solutions frequently 
> 
> We’re currently addressing the php2 code concern, which will be 
> eliminated from applicable code bases within the next few weeks. 
> 
> 
> 
> 
> 
> 
> Latest Firmware Updates 
> 
> Ubiquiti has updated the firmware for the affected devices. Please 
> update the firmware of your devices to the version listed here: 
> 
> 
> 
> DEVICES 
> 
> 
> 
> USE FIRMWARE 
> 
> 
> 
> v6.0.1 or later 
> 
> 
> 
> v8.0.1 or later 
> 
> 
> 
> v1.3.4 or later 
> 
> 
> 
> v1.1.8 or later 
> 
> 
> 
> v3.2.2 or later 
> 
> 
> 
> v3.2.2 or later 
> 
> 
> 
> v3.4.1 or later 
> 
> 
> 
> v3.6.1 or later 
> 
> 
> 
> For questions, contact our support team. 
> 
> Copyright © 2017, Ubiquiti Networks, Inc. All Rights Reserved. 
> Ubiquiti Networks 685 Third Avenue, 27th Floor New York, NY 10017 USA 
> 
> Share this on: 
> 
> Unsubscribe | Update Preferences | View in browser 
> 
> Follow: Facebook | Twitter | YouTube 
> 
> 
> 
> 
> 
> _______________________________________________ 
> Ubnt_users mailing list 
> [email protected] 
> http://lists.wispa.org/mailman/listinfo/ubnt_users 
> 
_______________________________________________ 
Ubnt_users mailing list 
[email protected] 
http://lists.wispa.org/mailman/listinfo/ubnt_users 

_______________________________________________
Ubnt_users mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/ubnt_users

Reply via email to