Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22557: Vulnerability in Ubiquiti Inc UniFi Network Application

0
Critical
VulnerabilityCVE-2026-22557cvecve-2026-22557
Published: Thu Mar 19 2026 (03/19/2026, 14:24:51 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Network Application

Description

A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.

AI-Powered Analysis

AILast updated: 03/19/2026, 14:54:26 UTC

Technical Analysis

CVE-2026-22557 is a critical security vulnerability identified in Ubiquiti Inc's UniFi Network Application, specifically affecting versions 9.0.118, 10.1.89, and 10.2.97. The vulnerability is a Path Traversal flaw, which allows an attacker with network access to manipulate file path parameters to access files outside the intended directory scope on the underlying system. This can lead to unauthorized disclosure of sensitive files, including those that may contain credentials or configuration data, enabling further compromise of user accounts and system integrity. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The CVSS v3.1 base score is 10.0, reflecting critical severity with network attack vector, low attack complexity, no privileges required, no user interaction, and complete impact on confidentiality, integrity, and availability. Although no exploits have been reported in the wild yet, the vulnerability's characteristics suggest it could be weaponized quickly. The UniFi Network Application is widely used for managing network devices in enterprise and service provider environments, increasing the potential impact of exploitation. The vulnerability was reserved in early January 2026 and published in March 2026, but no official patches or mitigation links are currently provided, emphasizing the need for immediate attention from affected organizations.

Potential Impact

The exploitation of CVE-2026-22557 can have severe consequences for organizations globally. Attackers can gain unauthorized access to sensitive system files, potentially extracting credentials, configuration files, or other critical data. This can lead to full system compromise, including unauthorized account access, lateral movement within the network, and persistent control over network infrastructure. The integrity of network management systems can be undermined, causing disruptions or manipulation of network configurations, which may result in denial of service or interception of network traffic. Given the UniFi Network Application's role in managing network devices, a successful attack could impact the availability and security of entire network environments, affecting business operations, data confidentiality, and regulatory compliance. The critical severity and ease of exploitation increase the likelihood of targeted attacks, especially against organizations relying heavily on Ubiquiti's solutions for network management.

Mitigation Recommendations

Organizations should immediately assess their exposure to the affected UniFi Network Application versions (9.0.118, 10.1.89, 10.2.97) and prioritize patching as soon as official updates are released by Ubiquiti. Until patches are available, network segmentation should be enforced to restrict access to the UniFi Network Application interfaces to trusted management networks only. Implement strict firewall rules to limit inbound traffic to the application and monitor network traffic for unusual file access patterns indicative of path traversal attempts. Employ intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting path traversal attacks. Regularly audit and review access logs for suspicious activity. Additionally, consider deploying application-layer gateways or reverse proxies that can sanitize and validate input paths to prevent traversal exploitation. Finally, maintain up-to-date backups of configuration and system files to enable rapid recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-07T15:39:03.439Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bc0a99e32a4fbe5fcbe3ff

Added to database: 3/19/2026, 2:39:21 PM

Last enriched: 3/19/2026, 2:54:26 PM

Last updated: 3/20/2026, 5:14:39 AM

Views: 216

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses