Patching Ubiquiti Unifi Access points manually via SSH+SCP when rolling update fails4 min read
Patching Ubiquiti Unifi Access points manually via SSH+SCP when rolling update fails
In this video we do a walk thru on how to update Ubiquiti Unifi Access Points manually when upgrading from the wireless controller fails.
We encountered this issue when we applied update 5.5.20 to the Wireless controller.
Tutorial covers downloading the upgrade locally to the access point and executing the necessary commands to trigger the update from the access point SSH console.
This video is part of a series of videos on updating Ubiquiti Unifi Access points to avoid being vulnerable to the WPA2 KRACK vulnerability discovered october 2017 and outlined on the whitepaper: https://www.krackattacks.com/
It is believed that upgrading all devices worldwide will take a few years since different manufacturers place different priorities on upgrading old products versus new products coming up to the market.
This vulnerability has taken war-driving to a whole new level since just driving by the vulnerable device or network attackers can gain access without needing to break any passwords or encryption.
Please subscribe to our channel in order to stay updated on the WPA2 KRACK vulnerability as manufacturers and software developers push updates to existing OS’es and devices. Initial video we published on the WPA2 KRACK vulnerability: https://youtu.be/xMsCUCckiTA