CVE-2026-22557: CVSS 10.0 in UniFi
Ubiquiti disclosed two vulnerabilities in its UniFi Network application, including CVE-2026-22557 with the maximum CVSS score of 10.0. An attacker with network access can exploit a path traversal flaw to access and manipulate system files, leading to full account compromise.
Why it’s critical
UniFi is massively deployed in SMBs, schools, and advanced home networks. Compromising the controller gives access to all device configurations, Wi-Fi credentials, VLANs, and potentially network traffic.
Exposure check
- Verify your UniFi Network Application version (Settings > System)
- Check if ports 8443/8080 are Internet-accessible
- Is UniFi Cloud Access enabled?
Hardening guide
- Update immediately to the latest version
- Restrict network access: dedicated management VLAN, block Internet access, firewall rules on port 8443
- Strengthen authentication: enable MFA, use unique strong passwords, disable default local accounts
- Monitor: enable controller logs, export to SIEM, watch for unusual connections
- Backup: automatic controller backups stored off-server, test restoration periodically
- Segment your network: separate IoT/cameras from user traffic via VLANs, isolate management
Recommended reading
These are affiliate links. If you make a purchase through these links, we may earn a commission at no extra cost to you.
- CompTIA Security+ SY0-701: covers network segmentation and hardening fundamentals.
- NordPass: manage credentials for your network equipment securely.
Sources
- Critical Ubiquiti UniFi Vulnerabilities - Shield53
Advertisement