Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22559: Vulnerability in Ubiquiti Inc UniFi Network Server

0
High
VulnerabilityCVE-2026-22559cvecve-2026-22559
Published: Tue Mar 24 2026 (03/24/2026, 19:05:40 UTC)
Source: CVE Database V5
Vendor/Project: Ubiquiti Inc
Product: UniFi Network Server

Description

An Improper Input Validation vulnerability in UniFi Network Server may allow unauthorized access to an account if the account owner is socially engineered into clicking a malicious link. Affected Products: UniFi Network Server (Version 10.1.85 and earlier) Mitigation: Update UniFi Network Server to Version 10.1.89 or later.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 19:47:14 UTC

Technical Analysis

CVE-2026-22559 is an improper input validation vulnerability identified in Ubiquiti Inc's UniFi Network Server software, specifically affecting versions 10.1.85 and earlier. The vulnerability arises from insufficient validation of user-supplied input, which can be exploited by an attacker to gain unauthorized access to user accounts. The attack vector requires the victim to be socially engineered into clicking a malicious link, making user interaction necessary but no prior authentication is required. Once exploited, the attacker can compromise the confidentiality, integrity, and availability of the UniFi Network Server by potentially taking over user accounts and manipulating network configurations or data. The vulnerability carries a CVSS v3.1 score of 8.8, indicating high severity, with attack vector being network accessible, low attack complexity, no privileges required, but user interaction needed. The scope is unchanged, but the impact on confidentiality, integrity, and availability is high. The vendor has addressed this issue in version 10.1.89, and updating to this or later versions is the primary mitigation. No public exploits or active exploitation have been reported yet, but the vulnerability's characteristics suggest it could be leveraged in targeted attacks, especially against organizations relying heavily on UniFi Network Server for network management.

Potential Impact

The vulnerability poses a significant risk to organizations worldwide that deploy UniFi Network Server for managing their network infrastructure. Successful exploitation can lead to unauthorized account access, allowing attackers to manipulate network settings, intercept or alter network traffic, and potentially disrupt network availability. This can result in data breaches, service outages, and loss of trust. Given the widespread use of UniFi products in enterprise, education, and government sectors, the impact could be broad, affecting critical infrastructure and sensitive data. Attackers exploiting this vulnerability could gain persistent footholds within networks, facilitating further lateral movement and advanced persistent threats. The requirement for user interaction via social engineering increases the risk in environments where users may be less security-aware. The high CVSS score reflects the potential for severe operational and security consequences if left unpatched.

Mitigation Recommendations

Organizations should immediately verify their UniFi Network Server version and upgrade to version 10.1.89 or later to remediate this vulnerability. Beyond patching, organizations should implement targeted user awareness training to reduce the risk of social engineering attacks that could trigger exploitation. Deploy email and web filtering solutions to detect and block malicious links that could be used in such attacks. Network segmentation should be employed to limit the exposure of UniFi Network Servers to only trusted network segments and users. Enable multi-factor authentication (MFA) on accounts managing UniFi Network Servers to add an additional layer of defense. Regularly monitor logs and network traffic for unusual access patterns or signs of compromise related to UniFi management interfaces. Maintain an incident response plan that includes procedures for handling potential account compromises and network device breaches. Finally, subscribe to vendor advisories and threat intelligence feeds to stay informed about any emerging exploits or related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hackerone
Date Reserved
2026-01-07T15:39:03.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2e66df4197a8e3b68b9a1

Added to database: 3/24/2026, 7:30:53 PM

Last enriched: 3/24/2026, 7:47:14 PM

Last updated: 3/24/2026, 8:43:20 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses