CVE-2026-22557 is a CVSS 10.0 path traversal vulnerability in Ubiquiti’s UniFi Network Application that allows unauthenticated attackers with network access to take over any account — including admin. It was patched on March 18, 2026, but here’s the alarming part: this is the third maximum-severity vulnerability in UniFi Network Application within 12 months. That’s not a bug — that’s a pattern.

Key Takeaway: Network management platforms — whether Cisco FMC, Cisco vManage, or Ubiquiti UniFi — are the #1 attack surface in 2026. Three CVSS 10.0 flaws in one product in one year means the architecture has systemic issues, and network engineers must treat every management interface as a high-value target requiring isolation, access controls, and aggressive patching.

What Exactly Is CVE-2026-22557?

According to Ubiquiti’s security advisory and the NVD entry:

AttributeDetail
CVECVE-2026-22557
CVSS Score10.0 (Maximum)
Vulnerability TypePath traversal
Attack VectorNetwork (unauthenticated)
ImpactAccount takeover (including admin)
Affected VersionsUniFi Network Application ≤ 9.0.118, ≤ 10.1.89, ≤ 10.2.97
Patch DateMarch 18, 2026
ExploitationNot yet observed in wild (as of March 21)

The attack: an unauthenticated attacker with network access to the UniFi management interface sends crafted requests that manipulate file path parameters. According to Security Online (March 2026), this allows the attacker to “access files on the underlying system that could be manipulated to access an underlying account, potentially including administrator accounts.”

The Companion Vulnerability: CVE-2026-22558

Ubiquiti patched a second flaw alongside it:

AttributeCVE-2026-22557CVE-2026-22558
TypePath traversalNoSQL injection
AuthenticationNone requiredRequired
ImpactAccount takeoverPrivilege escalation
CVSS10.0High (not max)
Chain potentialStandaloneChain with 22557 for full compromise

According to Offseq Radar, CVE-2026-22558 is an authenticated NoSQL injection that enables privilege escalation. By itself it requires credentials, but chained with CVE-2026-22557’s account takeover, an attacker could go from zero access to full admin privilege in two steps.

How Large Is the UniFi Attack Surface?

UniFi Network Application is everywhere. According to BleepingComputer (March 2026), the software “combines powerful internet gateways with scalable WiFi and switching” and is deployed across:

  • Home labs — hugely popular among network engineers for personal use
  • Small and medium businesses — affordable alternative to Cisco Meraki
  • Education and healthcare — budget-conscious campus deployments
  • Managed service providers — centralized management of multiple client sites

According to Censys advisory (March 2026), the exposure is significant. Many UniFi deployments have the management interface accessible from broader networks — or worse, from the Internet — because the default deployment model encourages cloud-accessible management.

Matthew Guidry, senior product detection engineer at Censys, told CyberScoop: “Because this is a path-traversal vulnerability, the technical complexity for an attacker to develop an exploit is relatively low.” He noted no public proof-of-concept existed as of the advisory date, but exploitation is expected given the low barrier.

Why Is Three CVSS 10.0 Flaws in One Year a Pattern?

This isn’t an isolated incident. According to community tracking by security researcher @ananayarora, CVE-2026-22557 is the third maximum-severity vulnerability disclosed in UniFi Network Application within 12 months.

The pattern suggests systemic issues in UniFi’s management application architecture:

  • Insufficient input validation — path traversal and injection flaws indicate user-supplied input isn’t properly sanitized before processing
  • Excessive privilege — the management application runs with enough system-level access that a web application flaw translates to full OS-level compromise
  • Authentication bypass surface — multiple paths to bypass or circumvent authentication suggest the authentication model has architectural gaps

This mirrors what we’re seeing across the networking industry. As we covered just hours ago with the Cisco FMC CVE-2026-20131 zero-day, management platforms from multiple vendors share the same vulnerability classes:

CVEProductCVSSTypeYear
CVE-2026-22557UniFi Network Application10.0Path traversal2026
CVE-2026-20131Cisco FMC10.0Insecure deserialization2026
CVE-2026-20127Cisco SD-WAN vManage9.8Input validation2026
CVE-2025-52665UniFi AccessCriticalAuth bypass2025
CVE-2023-20198Cisco IOS-XE Web UI10.0Privilege escalation2023

The common thread: web-based management interfaces are the attack surface, regardless of vendor. The management plane — the part of the network that controls everything else — is consistently the weakest link.

What Should You Do Right Now?

Immediate Actions

1. Patch UniFi Network Application

Update to the latest version (10.1.89+ or 10.2.97+ depending on your release track). According to RunZero’s advisory:

  • Cloud Gateways — update via the UniFi OS interface
  • Self-hosted — download and install the latest package from Ubiquiti’s site
  • Docker deployments — pull the latest container image

2. Restrict management interface access

If your UniFi management interface is accessible from the Internet or any untrusted network, restrict it now:

  • Bind the management interface to a dedicated management VLAN only
  • Use a reverse proxy with IP allowlisting if remote access is needed
  • Disable the default cloud access feature if you don’t need it
  • Enable MFA on all UniFi admin accounts

3. Audit your UniFi deployment

  • Check for unauthorized admin accounts or account changes
  • Review login history for anomalous access
  • Verify no unexpected configuration changes were made
  • If self-hosted, check system-level file integrity

Architecture Review

4. Apply the management plane isolation principle

Every network management platform in your environment should follow the same isolation model:

[Untrusted Networks / Internet]
         ↕ BLOCKED
[Management VLAN (isolated)]
    ├── UniFi Controller
    ├── Cisco FMC (if applicable)
    ├── DNA Center / Catalyst Center
    └── Jump Host with MFA
         ↕ ALLOWED (authenticated + MFA)
[Admin Workstations]

This is the same principle we’ve reinforced across multiple articles:

What’s the CCIE Security Lesson Here?

Ubiquiti isn’t on the CCIE blueprint. But the vulnerability pattern is exactly what CCIE Security tests under “infrastructure security” and “management plane protection.”

Management Plane Security Principles

The CCIE Security v6.1 blueprint tests your understanding of:

  • CoPP (Control Plane Policing) — rate-limiting management traffic to prevent abuse
  • Management VRF isolation — separating management traffic from data plane
  • AAA with MFA — ensuring only authorized administrators access management interfaces
  • ACLs on VTY/HTTP interfaces — restricting which source IPs can reach management services
  • Logging and monitoring — detecting unauthorized management access

These are vendor-agnostic principles. Whether you’re securing Cisco FMC, Ubiquiti UniFi, Arista CloudVision, or Juniper Junos Space — the architecture is the same:

  1. Isolate the management interface on a dedicated network
  2. Authenticate with strong credentials and MFA
  3. Authorize with role-based access controls
  4. Monitor all management plane access in real-time
  5. Patch management platforms with the same urgency as security appliances

The Home Lab Angle

Many CCIE candidates run UniFi in their home networks or small lab environments. If that’s you:

  • Patch your UniFi controller today — even home deployments are at risk if the management interface is reachable from your LAN
  • Don’t expose UniFi management to the Internet — use VPN for remote management
  • Use this as a study case — configure management plane protection on your lab devices and understand why it matters

Frequently Asked Questions

What is CVE-2026-22557?

CVE-2026-22557 is a critical (CVSS 10.0) path traversal vulnerability in Ubiquiti UniFi Network Application. An unauthenticated attacker with network access can manipulate file path parameters to access and modify files on the underlying system, leading to full account takeover.

Which UniFi versions are affected?

Affected versions include UniFi Network Application 9.0.118, 10.1.89, and 10.2.97 (and earlier). Ubiquiti released patches on March 18, 2026. Update to the latest version immediately.

Is CVE-2026-22557 being exploited in the wild?

As of March 21, 2026, no confirmed exploitation in the wild has been observed. However, Censys researchers warn the technical complexity for exploitation is low. Given the massive UniFi deployment base, exploitation is expected.

What is CVE-2026-22558?

CVE-2026-22558 is a companion vulnerability — an authenticated NoSQL injection that allows privilege escalation. It requires prior authentication but could be chained with CVE-2026-22557 for full system compromise.

Why should CCIE candidates care about Ubiquiti vulnerabilities?

The vulnerability pattern — management interface as attack surface — is identical to Cisco FMC and vManage flaws tested on CCIE Security. Understanding why management interfaces require isolation and access controls is directly tested on the blueprint.


Three CVSS 10.0 vulnerabilities in one product in one year isn’t bad luck — it’s an architectural warning. Whether you run UniFi at home or manage Cisco FMC in production, the lesson is the same: your network management platform is a high-value target, and it needs the same security rigor you apply to your firewalls.

Ready to fast-track your CCIE journey? Contact us on Telegram @phil66xx for a free assessment.