Ubiquiti / UniFI UDP port 10001 Exploit & Mitigation (in Description) for certain devices
Amazon Affiliate Store
➡️ https://www.amazon.com/shop/lawrencesystemspcpickup
Gear we used on Kit (affiliate Links)
➡️ https://kit.co/lawrencesystems
Try ITProTV free of charge and get 30% off!
➡️ https://go.itpro.tv/lts
Use OfferCode LTSERVICES to get 5% off your order at
➡️ https://lawrence.video/techsupplydirect
Tesla Referral Program Offer
🚘 https://www.tesla.com/referral/thomas65092
Lawrence Systems Shirts and Swag
👕 https://teespring.com/stores/lawrence-technology-services
Digital Ocean Offer Code
➡️ https://m.do.co/c/85de8d181725
HostiFi UniFi Cloud Hosting Service
➡️ https://hostifi.net/?via=lawrencesystems
Protect you privacy with a VPN from Private Internet Access
➡️ https://www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
Google Fi Service Referral Code
📱https://g.co/fi/r/TA02XR
More Of Our Affiliates that help us out and can get you discounts!
➡️ https://www.lawrencesystems.com/partners-and-affiliates/
Twitter
🐦 https://twitter.com/TomLawrenceTech
Patreon
🔗 https://www.patreon.com/lawrencesystems
Our Forums
🔗 https://forums.lawrencesystems.com/
GitHub
🔗 https://github.com/lawrencesystems/
Discord
🔗 https://discord.gg/ZwTz3Mh
Our Web Site
🔗 https://www.lawrencesystems.com/
PIA Internet Access Affiliates Link
https://www.privateinternetaccess.com/pages/buy-vpn/LRNSYS
The Tweet
Heads up! Ubiquiti networks devices are being remotely exploited, via port 10001 discovery service. Results in loss of device management, also being used as a weak UDP DDoS amplification attack: 56 bytes in, 206 bytes out. #UBNT #Ubiquiti #IoTSecurity #DDoS
— Jim Troutman (@troutman) January 29, 2019
The Rapid7 Write up
https://blog.rapid7.com/2019/02/01/ubiquiti-discovery-service-exposures/
UBNT’s response
https://community.ubnt.com/t5/airMAX-General-Discussion/airOS-airMAX-and-management-access/m-p/2654023
by Lawrence Systems
windows server dhcp vlan
Why cant they use mDNS like everyone else? Having to deal with IPv4 broadcast traffic for device discovery in 2021 is like trying to drive a formula 1 car with square wheels
Thanks for the Ubiquiti tip. My Ubiquiti devices are scanning my LAN with port 10001. The Symantec Endpoint Protection blocks it.
set service ubnt-discover disable will fix this, fwiw.
did some research 2 years ago: http://alext.mail.at/?p=460
I would say unifi is insecure by design, which leads to insecure usage
What would be a good test for port 10001? I checked canyouseeme dot org and am not seeing the port open.
You can lie about the source of a TCP segment as well.
Here’s the problem all Linux based routers have this vulnerability
because troupman love plug and play devices lol
Must be the same people who port forward RDP 😉
Hi Tom,
I just wanted to say that the quality of content on your channel is AMAZING. I am learning so much. Thank you for doing it. This is easily one of the most educational tech channels on youtube.
The people who expose the devices public need to be patched!! 😀 not so much the devices.
If you got usg3 that should filter managment interface already I would think.
Thanks Tom for a great vid , I immediately went and checked if port 100001 was open , on both the controllers and on the device side , almost scared me UFW is the best thanks a bunch Tom have a great one 🙂
can you go over how to configure your network to counter-act this exploit? i was thinking about changing my default lan ip from 192.168.1.0/24 anyway and might split management. thanks
I thought you need port forwarding on 10001 for remote Unifi controllers.
Everything should be accessible from the Internet! Convenience is always better than security. 🤣
More features always mean more risk. Period. Reason that I do not use the fancy or managed solutions.
I am confused is this UniFi. edgeOS or air Max?
it just means u need only 50bytes of traffic to generate 200 bytes of traffic = you can make a higher ddos which lower computers/mbits.
Can you do video on your chrome plugins please.
Some people should not be setting up networks.. Ever!
Why would anyone expose a device's management interface, Why can't people stop exposing devices aren't they IT Professionals?
Only if you use airOS