{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T11:36:54.155","vulnerabilities":[{"cve":{"id":"CVE-2024-34786","sourceIdentifier":"support@hackerone.com","published":"2024-07-09T02:15:10.177","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"UniFi iOS app 10.15.0 introduces a misconfiguration on 2nd Generation UniFi Access Points configured as standalone (not using UniFi Network Application) that could cause the SSID name to change and/or the WiFi Password to be removed on the 5GHz Radio.\n\nThis vulnerability is fixed in UniFi iOS app 10.15.2 and later."},{"lang":"es","value":"La aplicación UniFi iOS 10.15.0 introduce una configuración incorrecta en los puntos de acceso UniFi de segunda generación configurados como independientes (sin usar la aplicación de red UniFi) que podría provocar que el nombre SSID cambie y/o que se elimine la contraseña WiFi en la radio de 5 GHz. Esta vulnerabilidad se solucionó en la aplicación UniFi iOS 10.15.2 y posteriores."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N","baseScore":4.8,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.2,"impactScore":3.6}]},"references":[{"url":"https://community.ui.com/releases/Security-Advisory-Bulletin-040-040/b4b508c0-8453-405b-8660-1f55ade669c0","source":"support@hackerone.com"},{"url":"https://community.ui.com/releases/Security-Advisory-Bulletin-040-040/b4b508c0-8453-405b-8660-1f55ade669c0","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}