CVE-2026-22564: CWE-284 Improper Access Control - Generic in Ubiquiti Inc UniFi Play PowerAmp
CVE-2026-22564 is a critical Improper Access Control vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. It allows a malicious actor with network access to the UniFi Play environment to enable SSH access and make unauthorized system changes. The vulnerability affects UniFi Play PowerAmp versions 1. 0. 35 and earlier, and UniFi Play Audio Port versions 1. 0. 24 and earlier. A fix is available by updating to UniFi Play PowerAmp version 1. 0. 38 or later and UniFi Play Audio Port version 1.
AI Analysis
Technical Summary
This vulnerability (CVE-2026-22564) involves improper access control (CWE-284) in Ubiquiti's UniFi Play PowerAmp and UniFi Play Audio Port devices. An attacker with access to the UniFi Play network can enable SSH access without authorization, potentially allowing full system compromise. The issue affects UniFi Play PowerAmp versions up to 1.0.35 and UniFi Play Audio Port versions up to 1.0.24. The vendor has released updates (PowerAmp 1.0.38+, Audio Port 1.1.9+) that address this vulnerability. The CVSS score of 9.8 reflects the critical nature of this flaw, with network attack vector and no required privileges.
Potential Impact
Successful exploitation allows an attacker on the UniFi Play network to enable SSH access and perform unauthorized changes to the affected devices. This can lead to full compromise of device confidentiality, integrity, and availability. The vulnerability is critical due to its high CVSS score (9.8) and the lack of required privileges or user interaction for exploitation.
Mitigation Recommendations
Ubiquiti has provided official fixes for this vulnerability. Users should update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to remediate the issue. Applying these updates will mitigate the risk of unauthorized SSH access and system compromise.
CVE-2026-22564: CWE-284 Improper Access Control - Generic in Ubiquiti Inc UniFi Play PowerAmp
Description
CVE-2026-22564 is a critical Improper Access Control vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. It allows a malicious actor with network access to the UniFi Play environment to enable SSH access and make unauthorized system changes. The vulnerability affects UniFi Play PowerAmp versions 1. 0. 35 and earlier, and UniFi Play Audio Port versions 1. 0. 24 and earlier. A fix is available by updating to UniFi Play PowerAmp version 1. 0. 38 or later and UniFi Play Audio Port version 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2026-22564) involves improper access control (CWE-284) in Ubiquiti's UniFi Play PowerAmp and UniFi Play Audio Port devices. An attacker with access to the UniFi Play network can enable SSH access without authorization, potentially allowing full system compromise. The issue affects UniFi Play PowerAmp versions up to 1.0.35 and UniFi Play Audio Port versions up to 1.0.24. The vendor has released updates (PowerAmp 1.0.38+, Audio Port 1.1.9+) that address this vulnerability. The CVSS score of 9.8 reflects the critical nature of this flaw, with network attack vector and no required privileges.
Potential Impact
Successful exploitation allows an attacker on the UniFi Play network to enable SSH access and perform unauthorized changes to the affected devices. This can lead to full compromise of device confidentiality, integrity, and availability. The vulnerability is critical due to its high CVSS score (9.8) and the lack of required privileges or user interaction for exploitation.
Mitigation Recommendations
Ubiquiti has provided official fixes for this vulnerability. Users should update UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later to remediate the issue. Applying these updates will mitigate the risk of unauthorized SSH access and system compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-07T15:39:03.440Z
- Cvss Version
- 3.1
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69dd644b82d89c981f67c514
Added to database: 4/13/2026, 9:46:51 PM
Last enriched: 4/13/2026, 10:01:56 PM
Last updated: 4/14/2026, 10:03:21 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.