Ubiquiti UniFi Vulnerabilities - Critical Flaws Exposed
Basically, Ubiquiti found serious security holes that let hackers take over systems.
Ubiquiti has disclosed critical vulnerabilities in its UniFi Network Application. Attackers could gain full control of systems. Organizations must patch immediately to avoid severe risks.
The Flaw
Ubiquiti has revealed two significant vulnerabilities in its UniFi Network Application. The most critical, CVE-2026-22557, has a perfect CVSS score of 10.0, indicating its severity. This Path Traversal vulnerability allows unauthenticated attackers to access sensitive files on the underlying operating system. By exploiting this flaw, attackers can gain full administrative control of the host system without needing any special conditions or authentication.
The second vulnerability, CVE-2026-22558, is a NoSQL Injection flaw rated 7.7 on the CVSS scale. Unlike the first, this requires prior authentication, but it still poses a significant risk. Attackers with low-level credentials can escalate their privileges by injecting malicious queries, potentially compromising sensitive network configurations and internal account structures.
What's at Risk
Organizations using affected versions of the UniFi Network Application are at high risk. The vulnerabilities can lead to complete system compromise, allowing attackers to manipulate sensitive data and configurations. This could have severe implications for network security and data integrity, especially for businesses that rely on the UniFi platform for network management.
The affected versions include:
- UniFi Network App (Official): 10.1.85 and earlier
- UniFi Network App (Release Candidate): 10.2.93 and earlier
- UniFi Express (UX) Network App: 9.0.114 and earlier
Patch Status
Ubiquiti has released patches to address both vulnerabilities. Administrators are urged to upgrade immediately to the following versions:
- UniFi Network Application Version 10.1.89 or later for Official Release
- UniFi Network Application Version 10.2.97 or later for Release Candidate
- UniFi Express (UX): Update to firmware Version 4.0.13 or later, which includes Network Application Version 9.0.118 or later.
Given the critical nature of CVE-2026-22557, implementing additional security measures such as network segmentation and strict firewall rules is highly recommended. This will help limit exposure to the UniFi Network Application management interface.
Immediate Actions
Organizations using any affected version in internet-accessible environments should treat this as an emergency. Immediate action is necessary to mitigate the risk of exploitation. Here are steps to take:
- Upgrade to the patched versions as soon as possible.
- Review firewall settings to restrict access to the UniFi management interface.
- Monitor network activity for any signs of unauthorized access or exploitation attempts.
By acting swiftly, organizations can protect themselves from potential attacks and secure their network environments against these critical vulnerabilities.
Cyber Security News