CVE-2026-22557
Published: 19 March 2026
Summary
CVE-2026-22557 is a critical-severity Path Traversal (CWE-22) vulnerability in Ui (inferred from references). Its CVSS base score is 10.0 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 10.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-10 (Information Input Validation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly prevents path traversal exploitation by validating and sanitizing untrusted inputs to block directory traversal sequences in the UniFi Network Application.
Mandates timely identification, reporting, and patching of flaws like this critical path traversal vulnerability per Ubiquiti's Security Advisory Bulletin 062.
Enforces strict access control policies to restrict unauthorized file reads and manipulations on the underlying system even if traversal inputs are processed.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Path traversal in public-facing UniFi app directly enables remote unauthenticated file read/manipulation (T1190 initial access), arbitrary local file access (T1005), and directory/file enumeration (T1083).
NVD Description
A malicious actor with access to the network could exploit a Path Traversal vulnerability found in the UniFi Network Application to access files on the underlying system that could be manipulated to access an underlying account.
Deeper analysisAI
CVE-2026-22557 is a Path Traversal vulnerability (CWE-22) in the UniFi Network Application. A malicious actor with access to the network can exploit this flaw to access files on the underlying system. Published on 2026-03-19 with a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), it represents a critical risk due to its network accessibility, lack of prerequisites, and potential for high confidentiality, integrity, and availability impacts.
The vulnerability enables remote attackers with network access and no required privileges or user interaction to traverse paths and read arbitrary files on the affected system. Successful exploitation allows manipulation of accessed files, potentially leading to compromise of an underlying account. The changed scope (S:C) indicates the attack can affect resources beyond the vulnerable component itself.
Ubiquiti's Security Advisory Bulletin 062, available at https://community.ui.com/releases/Security-Advisory-Bulletin-062-062/c29719c0-405e-4d4a-8f26-e343e99f931b, provides guidance on mitigation and patching for the UniFi Network Application.
Details
- CWE(s)