Plattform
linux
Komponente
ubiquiti-unifi
Behoben in
1.0.38
1.1.9
CVE-2026-22562 describes a Path Traversal vulnerability discovered in Ubiquiti's UniFi Play PowerAmp and Audio Port devices. This vulnerability allows an attacker with network access to write files to the system, potentially enabling remote code execution. The vulnerability affects UniFi Play PowerAmp versions 1.0.0 through 1.1.9 and UniFi Play Audio Port versions 1.0.0 through 1.1.9. Updating to the latest versions (PowerAmp 1.0.38 or later, Audio Port 1.1.9 or later) is the recommended fix.
Successful exploitation of CVE-2026-22562 could grant an attacker the ability to execute arbitrary code on the affected UniFi Play device. This could lead to complete system compromise, allowing the attacker to steal sensitive data, install malware, or use the device as a pivot point to attack other systems on the network. The ability to write files to the system bypasses normal access controls, making this a particularly dangerous vulnerability. The impact is amplified by the potential for remote exploitation, meaning an attacker doesn't need physical access to the device.
CVE-2026-22562 was publicly disclosed on April 13, 2026. There is currently no indication of active exploitation in the wild, and no public proof-of-concept exploits have been released. The vulnerability has been added to the CISA KEV catalog, indicating a potential risk. The CVSS score of 9.8 (CRITICAL) reflects the severity of the vulnerability and the ease with which it can be exploited.
Organizations utilizing UniFi Play PowerAmp or Audio Port devices in their network infrastructure are at risk. This includes businesses using these devices for audio streaming or media playback, particularly those with less stringent network security controls. Shared hosting environments where multiple users share the same device are also at increased risk.
• linux / server:
journalctl -u unifi-play-poweramp -g 'path traversal'• linux / server:
ps aux | grep -i 'path traversal'• generic web:
curl -I 'http://<device_ip>/path/../sensitive_file.txt'disclosure
patch
Exploit-Status
EPSS
0.15% (35% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-22562 is to update the affected UniFi Play PowerAmp or Audio Port devices to the patched versions. For PowerAmp, upgrade to version 1.0.38 or later. For Audio Port, upgrade to version 1.1.9 or later. If an immediate upgrade is not possible due to compatibility issues or downtime concerns, consider segmenting the affected devices from the rest of the network to limit the potential blast radius. While a WAF or proxy cannot directly prevent this path traversal, it can be configured to monitor for suspicious file access patterns. After upgrading, confirm the fix by attempting to access a non-existent file via the vulnerable endpoint and verifying that access is denied.
Actualice el dispositivo UniFi Play PowerAmp a la versión 1.0.38 o posterior, o el UniFi Play Audio Port a la versión 1.1.9 o posterior para mitigar la vulnerabilidad de Path Traversal y prevenir la posible ejecución remota de código.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-22562 is a critical Path Traversal vulnerability affecting UniFi Play PowerAmp and Audio Port devices, allowing attackers to potentially execute code on the system.
You are affected if you are running UniFi Play PowerAmp versions 1.0.0–1.1.9 or UniFi Play Audio Port versions 1.0.0–1.1.9.
Upgrade UniFi Play PowerAmp to version 1.0.38 or later, or UniFi Play Audio Port to version 1.1.9 or later.
There is currently no indication of active exploitation in the wild, but the vulnerability is considered critical.
Refer to the Ubiquiti security advisory for detailed information and updates: [https://www.ubiquiti.com/security/advisories/](https://www.ubiquiti.com/security/advisories/)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.