Critical UniFi Account Takeover Vulnerability: Protect Your Network from Severe Exploits

Critical UniFi Account Takeover Vulnerability: Protect Your Network from Severe Exploits

Critical Vulnerability Discovered in Ubiquiti UniFi Network Application

A critical vulnerability has been discovered in the Ubiquiti UniFi Network Application, a management tool used to configure and monitor Ubiquiti networking hardware.

Vulnerability Details

The flaw, tracked as CVE-2026-22557, affects versions 10.1.85 and earlier of the UniFi Network app and could allow attackers to take control of user accounts.

The vulnerability is a path traversal issue that can be exploited by threat actors without privileges to access files on targeted devices. This could potentially lead to account hijacking in low-complexity attacks that do not require user interaction.

Additional Vulnerability Patched

In addition to the path traversal vulnerability, Ubiquiti has also patched a second flaw in the UniFi Network app that could be exploited by attackers with low privileges for privilege escalation.

The vulnerability, an authenticated NoSQL injection issue, could allow a malicious actor with authenticated access to the network to escalate privileges.

Importance of Keeping Software Up to Date

Ubiquiti’s products have been targeted by both state-backed hacking groups and cybercriminals in recent years.

For example, in February 2024, the FBI dismantled a botnet of hacked Ubiquiti Edge OS routers used by Russia’s Main Intelligence Directorate of the General Staff (GRU) to proxy malicious traffic in attacks targeting the United States and its allies.

Recommendations

The patching of these vulnerabilities by Ubiquiti is a reminder of the importance of keeping software up to date to prevent exploitation by malicious actors.

In order to protect against attacks that exploit vulnerabilities like these, it is essential to keep software up to date and to implement robust security measures, such as access controls and monitoring.

This is particularly important for organizations that rely on Ubiquiti products as part of their network infrastructure.



About Author

en_USEnglish