EUVD-2026-22094

| CVE-2026-22565 HIGH
2026-04-13 hackerone GHSA-hj6r-ww52-66xr
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

5
Analysis Updated
Apr 16, 2026 - 05:57 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
1.0.38,1.1.9
Analysis Generated
Apr 15, 2026 - 01:12 vuln.today
CVSS Changed
Apr 14, 2026 - 21:22 NVD
7.5 (HIGH)

DescriptionNVD

An Improper Input Validation vulnerability could allow a malicious actor with access to the UniFi Play network to cause the device to stop responding.

Affected Products: UniFi Play PowerAmp (Version 1.0.35 and earlier) UniFi Play Audio Port  (Version 1.0.24 and earlier)

Mitigation: Update UniFi Play PowerAmp to Version 1.0.38 or later Update UniFi Play Audio Port  to Version 1.1.9 or later

AnalysisAI

Denial of service in Ubiquiti UniFi Play PowerAmp (≤1.0.35) and Audio Port (≤1.0.24) allows unauthenticated remote attackers to crash devices via improper input validation. CVSS 7.5 (High) with network-based attack requiring no privileges or user interaction. …

Sign in for full analysis, threat intelligence, and remediation guidance.

RemediationAI

Within 24 hours: Identify all UniFi Play PowerAmp (≤1.0.35) and Audio Port (≤1.0.24) devices in your environment using inventory tools or Ubiquiti management consoles. Within 7 days: Test vendor patches (PowerAmp 1.0.38+ and Audio Port 1.1.9+) in a non-production environment to validate compatibility with existing deployments. …

Sign in for detailed remediation steps.

Share

EUVD-2026-22094 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy