How to find Ubiquiti devices on your network

March 31, 2021, by

Thao Doan

Earlier this year, Ubiquiti, a popular networking equipment manufacturer for businesses and consumers, disclosed a security breach that potentially exposed customer data. However, recent news indicates that the reported breach was intentionally and severely underreported, and the potential impact was much greater than disclosed. You can read the Krebs article for more in-depth reporting of the breach and its potential impact.

Right now, it’s critical to audit and find Ubiquiti devices. After you’ve identified these devices, consider:

  • Changing the passwords and enabling 2FA, if you haven’t already.
  • Ensuring the devices are on the latest firmware.
  • Deleting and rebuilding your device profiles from scratch, if you want to be absolutely certain your systems are not impacted by this breach.

Finding Ubiquiti devices with Rumble

Rumble users can quickly find Ubiquiti devices in their inventory with this handy pre-built query. This query searches for any live asset that has Ubiquiti as the vendor, hardware, or OS, and it also searches for the UBNT protocol.

alive:t AND (vendor:Ubiquiti OR hw:Ubiquiti OR os:Ubiquiti OR protocol:ubnt OR names:unifi OR names:ubiquiti)

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Find prebuilt queries in the Queries Library

Try Rumble

Don’t have Rumble and need help finding Ubiquiti devices? Start your Rumble trial today.

Similar Content

September 9, 2021

Finding Confluence servers with Rumble

The U.S. Cyber Command recently reported “mass exploitation” of a code execution vulnerability in Atlassian’s popular Confluence software (CVE-2021-26084). This vulnerability has a CVSS Base score of 9.8 (considered “critical”), requires no authentication for exploitation, …

Read More

August 25, 2021

Finding Fortinet web application firewall devices with Rumble

Recently published security research from Rapid7 provides details on an OS command injection vulnerability in Fortinet’s web application firewall (WAF) product line known as FortiWeb. This vulnerability exists in the FortiWeb management interface (versions 6.3.11 and prior) …

Read More

July 15, 2021

How to find SolarWinds Serv-U systems on your network

Microsoft recently notified SolarWinds that they had discovered a remote code execution vulnerability in Serv-U Managed File Transfer and Serv-U Secure FTP. The vulnerability being exploited is CVE-2021-35211 and only exists when SSH is enabled in Serv-U environments. …

Read More