Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21638: Vulnerability in Ubiquiti Inc UBB-XG

0
High
VulnerabilityCVE-2026-21638cvecve-2026-21638
Published: Thu Jan 08 2026 (01/08/2026, 16:14:22 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UBB-XG

Description

A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product. Affected Products: UBB-XG (Version 1.2.2 and earlier) UDB-Pro/UDB-Pro-Sector (Version 1.4.1 and earlier) UBB (Version 3.1.5 and earlier) Mitigation: Update your UBB-XG to Version 1.2.3 or later. Update your UDB-Pro/UDB-Pro-Sector to Version 1.4.2 or later. Update your UBB to Version 3.1.7 or later.

AI-Powered Analysis

AILast updated: 01/08/2026, 16:37:24 UTC

Technical Analysis

CVE-2026-21638 is a vulnerability discovered in Ubiquiti Inc's wireless networking products, specifically the UBB-XG (version 1.2.2 and earlier), UDB-Pro/UDB-Pro-Sector (version 1.4.1 and earlier), and UBB (version 3.1.5 and earlier). The flaw resides in the airMAX Wireless Protocol implementation, which is used for communication between these devices. An attacker located within the wireless range of the affected device can exploit this vulnerability to perform remote code execution (RCE) without requiring any authentication or user interaction. This means the attacker can run arbitrary code on the device, potentially taking full control over it. The CVSS v3.1 base score is 8.8, indicating a high severity level, with the vector AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. This vector shows that the attack requires adjacent network access (Wi-Fi range), has low attack complexity, no privileges or user interaction needed, and impacts confidentiality, integrity, and availability at a high level. The vulnerability allows an attacker to compromise the device’s firmware or software stack, which could lead to interception or manipulation of network traffic, disruption of network services, or use of the device as a foothold for further attacks within the network. Although no known exploits are currently reported in the wild, the availability of patches indicates that the vendor has addressed the issue. The recommended mitigation is to upgrade affected devices to UBB-XG version 1.2.3 or later, UDB-Pro/UDB-Pro-Sector version 1.4.2 or later, and UBB version 3.1.7 or later. Failure to patch leaves critical wireless infrastructure vulnerable to compromise.

Potential Impact

For European organizations, this vulnerability poses a significant risk to wireless network infrastructure, especially in sectors relying heavily on Ubiquiti devices such as telecommunications, enterprise networks, public Wi-Fi providers, and critical infrastructure operators. Successful exploitation could lead to full device compromise, allowing attackers to intercept sensitive communications, disrupt network availability, or pivot into internal networks for further attacks. This could result in data breaches, operational downtime, and damage to organizational reputation. Given the proximity requirement (Wi-Fi range), attackers could leverage physical access or nearby locations to launch attacks, which is a realistic threat in urban and densely populated areas. The impact is particularly critical for organizations with large-scale deployments of affected Ubiquiti products, as a single compromised device could jeopardize the security of the entire network segment. Additionally, the high confidentiality, integrity, and availability impact ratings underscore the potential for severe consequences if exploited.

Mitigation Recommendations

1. Immediately identify all affected Ubiquiti devices (UBB-XG, UDB-Pro/UDB-Pro-Sector, UBB) in the network inventory. 2. Apply vendor-provided patches by upgrading to UBB-XG version 1.2.3 or later, UDB-Pro/UDB-Pro-Sector version 1.4.2 or later, and UBB version 3.1.7 or later without delay. 3. Restrict physical and wireless access to critical network areas to reduce the risk of attackers being within Wi-Fi range. 4. Implement wireless network segmentation and monitoring to detect anomalous activity indicative of exploitation attempts. 5. Use strong wireless encryption and authentication mechanisms to limit unauthorized access, even though this vulnerability does not require authentication. 6. Regularly audit and update device firmware and software to ensure timely application of security patches. 7. Employ network intrusion detection systems (NIDS) tuned to detect suspicious traffic patterns related to airMAX protocol anomalies. 8. Educate security teams about this vulnerability and ensure incident response plans include steps for wireless device compromise scenarios.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.339Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695fd9d02717593a334c2bdf

Added to database: 1/8/2026, 4:22:40 PM

Last enriched: 1/8/2026, 4:37:24 PM

Last updated: 1/9/2026, 12:16:55 PM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats