{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-27T01:31:48.590","vulnerabilities":[{"cve":{"id":"CVE-2024-45205","sourceIdentifier":"support@hackerone.com","published":"2024-12-04T02:15:05.323","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"An Improper Certificate Validation on the UniFi iOS App managing a standalone UniFi Access Point (not using UniFi Network Application) could allow a malicious actor with access to an adjacent network to take control of this UniFi Access Point.\n\n\nAffected Products:\nUniFi iOS App (Version 10.17.7 and earlier) \n \nMitigation:\nUniFi iOS App (Version 10.18.0 or later)."},{"lang":"es","value":"Una validación de certificado incorrecta en la aplicación UniFi iOS que administra un punto de acceso UniFi independiente (sin usar la aplicación de red UniFi) podría permitir que un actor malintencionado con acceso a una red adyacente tome el control de este punto de acceso UniFi. Productos afectados: aplicación UniFi iOS (versión 10.17.7 y anteriores) Mitigación: aplicación UniFi iOS (versión 10.18.0 o posterior)."}],"metrics":{"cvssMetricV30":[{"source":"support@hackerone.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H","baseScore":7.1,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-295"}]}],"references":[{"url":"https://community.ui.com/releases/UniFi-iOS-10-18-0/42f02428-544c-4626-b5b3-5ae40308edc7","source":"support@hackerone.com"}]}}]}