UniFi Play WiFi Credentials Exposed by Access Control Flaw
The National Vulnerability Database has flagged a critical Improper Access Control vulnerability (CVE-2026-22566) impacting Ubiquiti’s UniFi Play ecosystem. This flaw, rated HIGH with a CVSS score of 7.5, could allow a threat actor with network access to pilfer UniFi Play WiFi credentials.
The vulnerability specifically affects UniFi Play PowerAmp versions 1.0.35 and earlier, and UniFi Play Audio Port versions 1.0.24 and earlier. The National Vulnerability Database notes that a successful exploitation requires an attacker to already have a foothold within the UniFi Play network. Once inside, however, the access control weakness can be leveraged to harvest sensitive WiFi authentication data.
To remediate this exposure, users are strongly advised to update UniFi Play PowerAmp to version 1.0.38 or later, and UniFi Play Audio Port to version 1.1.9 or later. Prompt patching is crucial to prevent potential unauthorized access to the network and subsequent compromise.
Related ATT&CK Techniques
🛡️ Detection Rules
1 rules · 5 SIEM formats1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.
Exploitation Attempt — UniFi Play WiFi Credentials Exposed by A
Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.
1 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get Detection Rules →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-22566 | Improper Access Control | UniFi Play PowerAmp version 1.0.35 and earlier |
| CVE-2026-22566 | Improper Access Control | UniFi Play Audio Port version 1.0.24 and earlier |
| CVE-2026-22566 | Information Disclosure | Obtain UniFi Play WiFi credentials via UniFi Play network access |