UniFi Play WiFi Credentials Exposed by Access Control Flaw

UniFi Play WiFi Credentials Exposed by Access Control Flaw

The National Vulnerability Database has flagged a critical Improper Access Control vulnerability (CVE-2026-22566) impacting Ubiquiti’s UniFi Play ecosystem. This flaw, rated HIGH with a CVSS score of 7.5, could allow a threat actor with network access to pilfer UniFi Play WiFi credentials.

The vulnerability specifically affects UniFi Play PowerAmp versions 1.0.35 and earlier, and UniFi Play Audio Port versions 1.0.24 and earlier. The National Vulnerability Database notes that a successful exploitation requires an attacker to already have a foothold within the UniFi Play network. Once inside, however, the access control weakness can be leveraged to harvest sensitive WiFi authentication data.

To remediate this exposure, users are strongly advised to update UniFi Play PowerAmp to version 1.0.38 or later, and UniFi Play Audio Port to version 1.1.9 or later. Prompt patching is crucial to prevent potential unauthorized access to the network and subsequent compromise.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rules · 5 SIEM formats

1 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, and QRadar AQL.

high vulnerability event-type

Exploitation Attempt — UniFi Play WiFi Credentials Exposed by A

Sigma Splunk SPL Sentinel KQL Elastic QRadar AQL

Get this rule in your SIEM's native format — copy, paste, detect. No manual conversion.

1 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.

Get Detection Rules →

Indicators of Compromise

IDTypeIndicator
CVE-2026-22566 Improper Access Control UniFi Play PowerAmp version 1.0.35 and earlier
CVE-2026-22566 Improper Access Control UniFi Play Audio Port version 1.0.24 and earlier
CVE-2026-22566 Information Disclosure Obtain UniFi Play WiFi credentials via UniFi Play network access

Related Posts

Critical RCE Flaw Hits NuGet Gallery Backend

CVE-2026-39399 — NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within...

vulnerabilityCVEcriticalhigh-severityremote-code-executioncwe-20cwe-22
/CRITICAL /⚑ 4 IOCs

BoidCMS LFI to RCE: A Critical Template Flaw

CVE-2026-39387 — BoidCMS is an open-source, PHP-based flat-file CMS for building simple websites and blogs, using JSON as its database. Versions prior to 2.1.3 are...

vulnerabilityCVEhigh-severityremote-code-executioncwe-98
/HIGH /⚑ 4 IOCs

Nanobot AI: WebSocket Hijack Puts WhatsApp Sessions at Risk

CVE-2026-35589 — nanobot is a personal AI assistant. Versions prior to 0.1.5 contain a Cross-Site WebSocket Hijacking (CSWSH) vulnerability exists in the bridge's WebSocket server...

vulnerabilityCVEhigh-severitycwe-1385
/HIGH /⚑ 5 IOCs