Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
DDoS Attack Hits Ubuntu Website & Canonical Web Services
May 1, 2026
Ransomware Victims Jump to 7,831 as AI Crime Tools Scale Global
May 1, 2026
Deep#Door Stealer Harvests Passwords, Cloud Browser Tokens
May 1, 2026
Home/CyberSecurity News/Critical Ubiquiti UniFi Vulnerabilities Allow Attackers to Seize
CyberSecurity News

Critical Ubiquiti UniFi Vulnerabilities Allow Attackers to Seize

Ubiquiti recently disclosed two critical-to-high severity vulnerabilities impacting its widely deployed UniFi Network Application. Among these is a maximum-severity flaw that allows unauthenticated...

Emy Elsamnoudy
Emy Elsamnoudy
March 19, 2026 2 Min Read
0 0

Ubiquiti recently disclosed two critical-to-high severity vulnerabilities impacting its widely deployed UniFi Network Application. Among these is a maximum-severity flaw that allows unauthenticated attackers to seize full control of underlying systems. Organizations operating affected versions must patch immediately.

Table Of Content

  • CVE-2026-22557: Path Traversal Enables Full System Compromise
  • CVE-2026-22558: NoSQL Injection Enables Privilege Escalation
  • Mitigations

CVE-2026-22557: Path Traversal Enables Full System Compromise

The more severe of the two flaws, tracked as CVE-2026-22557, is a Path Traversal vulnerability carrying a CVSS v3.1 Base Score of 10.0 (Critical) the highest possible rating.

The vulnerability’s vector (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) confirms that no authentication, user interaction, or special conditions are required to exploit it remotely.

A malicious actor with network access could weaponize this flaw to traverse directory boundaries within the UniFi Network Application and access sensitive files on the underlying operating system.

Those files could then be manipulated to gain unauthorized access to underlying system accounts, effectively handing an attacker complete administrative control over the host.

The vulnerability was discovered and reported by security researcher n00r3 (@izn0u).

CVE-2026-22558: NoSQL Injection Enables Privilege Escalation

The second flaw, CVE-2026-22558, is an authenticated NoSQL Injection vulnerability rated 7.7 (High) on the CVSS v3.1 scale. Although this vulnerability requires prior authentication (PR:L), it operates across a changed scope (S:C) and achieves high confidentiality impact, making it a potent escalation path for attackers who have already obtained low-level credentials.

By injecting malicious NoSQL queries through the application layer, an authenticated attacker could escalate privileges beyond their authorized access level, potentially compromising sensitive network configuration data and internal account structures. The flaw was discovered by Garett Kopcha (@0x5t).

Product Affected Version
UniFi Network App (Official) 10.1.85 and earlier
UniFi Network App (Release Candidate) 10.2.93 and earlier
UniFi Express (UX) Network App 9.0.114 and earlier

Mitigations

Ubiquiti has released patched versions addressing both vulnerabilities simultaneously. Administrators should apply updates without delay:

  • Official Release: Upgrade to UniFi Network Application Version 10.1.89 or later
  • Release Candidate: Upgrade to UniFi Network Application Version 10.2.97 or later
  • UniFi Express (UX): Update firmware to Version 4.0.13 or later, which bundles Network Application Version 9.0.118 or later

Given the perfect CVSS score of CVE-2026-22557, network segmentation and strict firewall rules limiting exposure of the UniFi Network Application management interface should be implemented as an additional defensive layer.

Ubiquiti customers running any affected version in internet-accessible environments face particularly elevated risk and should treat this as an emergency patch.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Vibe-Coded” Malware Uses Fake Tools & Campaign CDNs

Next Post

CISA: Secure Microsoft Intune After Stryker Urges Organizations

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Wireshark Flaws Allow Code Execution via Malformed
May 1, 2026
Anthropic Launches Claude Security Beta for Enterprise
May 1, 2026
Human-Centric
Beyond the Click: A Human-Centric Approach to Phishing Defense
April 30, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us