Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
- Last update: 19/03/2026
- Affected software:
→ Official Release: UniFi Network application (Version 10.1.85 and earlier)
→ Release Candidate: UniFi Network application (Version 10.2.93 and earlier)
→ UniFi Express (UX): UniFi Network application (Version 9.0.114 and earlier)- Type:
→ CWE-35: Path Traversal
→ CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')- CVE/CVSS
→ CVE-2026-22557: CVSS 10 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
→ CVE 2026 22558: CVSS 7.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
The UniFi Network Application is the central platform for managing network devices, including Wi‑Fi access points, switches, and security policies across enterprise and SMB environments.
Two severe vulnerabilities have been identified:
These vulnerabilities can be chained: an attacker exploiting the Path Traversal could gain system access and then leverage the NoSQL Injection to escalate privileges, amplifying impact across the network.
Exploitation would have a high impact on confidentiality, integrity, and availability. Since the UniFi Network Application centrally manages network traffic, device configurations, and user access, attackers could manipulate network settings, extract credentials, or escalate privileges across managed infrastructure.
As of publication, there is no evidence of exploitation in the wild.
These vulnerabilities allow attackers to:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
CVE.org - https://www.cve.org/CVERecord?id=CVE-2026-22557
CVE.org - https://www.cve.org/CVERecord?id=CVE-2026-22558