Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-21638: Vulnerability in Ubiquiti Inc UBB-XG

0
High
VulnerabilityCVE-2026-21638cvecve-2026-21638
Published: Thu Jan 08 2026 (01/08/2026, 16:14:22 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UBB-XG

Description

A malicious actor in Wi-Fi range of the affected product could leverage a vulnerability in the airMAX Wireless Protocol to achieve a remote code execution (RCE) within the affected product. Affected Products: UBB-XG (Version 1.2.2 and earlier) UDB-Pro/UDB-Pro-Sector (Version 1.4.1 and earlier) UBB (Version 3.1.5 and earlier) Mitigation: Update your UBB-XG to Version 1.2.3 or later. Update your UDB-Pro/UDB-Pro-Sector to Version 1.4.2 or later. Update your UBB to Version 3.1.7 or later.

AI-Powered Analysis

AILast updated: 01/15/2026, 17:12:21 UTC

Technical Analysis

CVE-2026-21638 is a remote code execution (RCE) vulnerability identified in Ubiquiti Inc's wireless networking products, specifically the UBB-XG (version 1.2.2 and earlier), UDB-Pro/UDB-Pro-Sector (version 1.4.1 and earlier), and UBB (version 3.1.5 and earlier). The vulnerability arises from a flaw in the airMAX Wireless Protocol implementation, which allows a malicious actor within Wi-Fi range to send crafted packets that trigger command injection (CWE-77) leading to arbitrary code execution on the device. The attack vector is network-based (AV:A), requiring no privileges (PR:N) or user interaction (UI:N), making exploitation relatively straightforward for an attacker in proximity. The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability (all rated high). Successful exploitation could allow attackers to fully compromise the device, potentially enabling interception or manipulation of network traffic, pivoting into internal networks, or disrupting wireless services. Although no known exploits are currently reported in the wild, the presence of a public CVE and high severity score necessitates urgent remediation. Ubiquiti has released patches addressing this vulnerability in versions 1.2.3+ for UBB-XG, 1.4.2+ for UDB-Pro/UDB-Pro-Sector, and 3.1.7+ for UBB. The vulnerability's root cause is command injection within the wireless protocol handling code, a critical flaw given the device's role in network infrastructure.

Potential Impact

For European organizations, this vulnerability poses significant risks, particularly for enterprises, service providers, and critical infrastructure operators relying on Ubiquiti wireless devices for network connectivity. Exploitation could lead to full device compromise, enabling attackers to intercept sensitive data, disrupt wireless communications, or use the device as a foothold for lateral movement within corporate networks. This could result in data breaches, operational downtime, and loss of service availability. Given the wireless nature of the attack vector, attackers only need to be within physical proximity, which raises concerns for organizations with exposed or poorly secured wireless deployments. The impact is heightened for sectors such as telecommunications, government, finance, and industrial control systems where network reliability and data confidentiality are paramount. Additionally, compromised devices could be leveraged in broader attacks such as botnets or as entry points for ransomware campaigns targeting European entities.

Mitigation Recommendations

Organizations should immediately inventory their Ubiquiti devices to identify affected versions of UBB-XG, UDB-Pro/UDB-Pro-Sector, and UBB products. The primary mitigation is to apply the vendor-provided patches: upgrade UBB-XG to version 1.2.3 or later, UDB-Pro/UDB-Pro-Sector to version 1.4.2 or later, and UBB to version 3.1.7 or later. Until patches are applied, organizations should restrict physical access to wireless devices and limit Wi-Fi signal exposure to untrusted areas to reduce attacker proximity. Network segmentation should be enforced to isolate wireless infrastructure from sensitive internal networks. Monitoring for unusual wireless traffic patterns and device behavior can help detect exploitation attempts. Additionally, disabling unused wireless protocols or features related to airMAX may reduce attack surface. Regular firmware update policies and vulnerability scanning should be reinforced to prevent future risks. Finally, organizations should educate staff about the risks of physical proximity attacks on wireless infrastructure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-01T15:00:02.339Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695fd9d02717593a334c2bdf

Added to database: 1/8/2026, 4:22:40 PM

Last enriched: 1/15/2026, 5:12:21 PM

Last updated: 2/7/2026, 6:17:53 AM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats