CVE-2026-22565: CWE-20 Improper Input Validation in Ubiquiti Inc UniFi Play PowerAmp
CVE-2026-22565 is an improper input validation vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. A malicious actor with access to the UniFi Play network could exploit this flaw to cause the affected device to stop responding. The vulnerability affects UniFi Play PowerAmp versions 1. 0. 35 and earlier, and UniFi Play Audio Port versions 1. 0. 24 and earlier. Updates are available to remediate this issue by upgrading to UniFi Play PowerAmp version 1. 0. 38 or later and UniFi Play Audio Port version 1.
AI Analysis
Technical Summary
This vulnerability (CVE-2026-22565) involves improper input validation (CWE-20) in Ubiquiti's UniFi Play PowerAmp and UniFi Play Audio Port devices. Specifically, malformed input from an actor with network access to the UniFi Play environment can cause the device to become unresponsive. The issue affects UniFi Play PowerAmp versions up to 1.0.35 and UniFi Play Audio Port versions up to 1.0.24. Vendor guidance indicates that updating to UniFi Play PowerAmp 1.0.38 or later and UniFi Play Audio Port 1.1.9 or later mitigates the vulnerability. The vulnerability is not related to cloud services, and no official CVSS score or remediation level is provided in the source data.
Potential Impact
Successful exploitation allows a malicious actor with network access to cause the affected device to stop responding, resulting in denial of service conditions on UniFi Play PowerAmp and UniFi Play Audio Port devices. There is no indication of further compromise such as code execution or data leakage from the provided information.
Mitigation Recommendations
Apply the vendor-provided updates by upgrading UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later. These updates address the improper input validation vulnerability. Since this is a device-level issue and not a cloud service, remediation requires applying these firmware/software updates directly to the affected devices.
CVE-2026-22565: CWE-20 Improper Input Validation in Ubiquiti Inc UniFi Play PowerAmp
Description
CVE-2026-22565 is an improper input validation vulnerability in Ubiquiti Inc's UniFi Play PowerAmp and UniFi Play Audio Port devices. A malicious actor with access to the UniFi Play network could exploit this flaw to cause the affected device to stop responding. The vulnerability affects UniFi Play PowerAmp versions 1. 0. 35 and earlier, and UniFi Play Audio Port versions 1. 0. 24 and earlier. Updates are available to remediate this issue by upgrading to UniFi Play PowerAmp version 1. 0. 38 or later and UniFi Play Audio Port version 1.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This vulnerability (CVE-2026-22565) involves improper input validation (CWE-20) in Ubiquiti's UniFi Play PowerAmp and UniFi Play Audio Port devices. Specifically, malformed input from an actor with network access to the UniFi Play environment can cause the device to become unresponsive. The issue affects UniFi Play PowerAmp versions up to 1.0.35 and UniFi Play Audio Port versions up to 1.0.24. Vendor guidance indicates that updating to UniFi Play PowerAmp 1.0.38 or later and UniFi Play Audio Port 1.1.9 or later mitigates the vulnerability. The vulnerability is not related to cloud services, and no official CVSS score or remediation level is provided in the source data.
Potential Impact
Successful exploitation allows a malicious actor with network access to cause the affected device to stop responding, resulting in denial of service conditions on UniFi Play PowerAmp and UniFi Play Audio Port devices. There is no indication of further compromise such as code execution or data leakage from the provided information.
Mitigation Recommendations
Apply the vendor-provided updates by upgrading UniFi Play PowerAmp to version 1.0.38 or later and UniFi Play Audio Port to version 1.1.9 or later. These updates address the improper input validation vulnerability. Since this is a device-level issue and not a cloud service, remediation requires applying these firmware/software updates directly to the affected devices.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hackerone
- Date Reserved
- 2026-01-07T15:39:03.441Z
- Cvss Version
- null
- State
- PUBLISHED
- Remediation Level
- null
Threat ID: 69dd644b82d89c981f67c517
Added to database: 4/13/2026, 9:46:51 PM
Last enriched: 4/13/2026, 10:02:25 PM
Last updated: 4/14/2026, 10:53:10 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.