PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-33000 Ubiquiti Inc CVE debrief

CVE-2026-33000 is a critical improper input validation issue affecting UniFi OS devices. According to the NVD record, a network-accessible attacker with high privileges could trigger command injection, with potential impacts to confidentiality, integrity, and availability. The published CVSS 3.1 vector is AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H, which indicates severe consequences despite the high-privilege prerequisite.

Vendor
Ubiquiti Inc
Product
UniFi OS Server
CVSS
CRITICAL 9.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-05-22
Original CVE updated
2026-05-22
Advisory published
2026-05-22
Advisory updated
2026-05-22

Who should care

Organizations running UniFi OS devices, especially administrators who expose management functions to trusted networks or delegate elevated access, should prioritize this issue. Security teams responsible for network appliance hardening, segmentation, and privileged account control should also review it closely.

Technical summary

The vulnerability is categorized as CWE-20 (Improper Input Validation). The NVD entry describes a command injection path reachable over the network but requiring high privileges. The affected product is described as UniFi OS devices, with the supporting reference pointing to a Ui community security advisory. The CVSS scope change and high impact scores suggest a serious trust-boundary issue if an attacker can satisfy the privilege requirement.

Defensive priority

Urgent. Even though the attacker must already have high privileges, the combination of network access, command injection, and critical CVSS scoring makes this a high-priority remediation item for environments using UniFi OS devices.

Recommended defensive actions

  • Review the Ui community security advisory and any vendor guidance tied to the issue before making changes.
  • Inventory UniFi OS devices and identify which administrative or privileged access paths are available on trusted networks.
  • Restrict and monitor high-privilege access, especially from network locations that do not strictly require it.
  • Apply vendor-provided updates or mitigations as soon as they are available for your environment.
  • Increase logging and alerting around privileged management actions and unexpected command execution behavior.
  • Reassess segmentation so management interfaces are isolated from broader network access.

Evidence notes

This debrief is based only on the supplied NVD-modified source item and its official reference link. The source record identifies CVE-2026-33000 as Vulnerable with a supporting reference to a Ui community security advisory and includes the CVSS vector AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H plus CWE-20. No KEV listing or ransomware association was provided in the corpus.

Official resources

CVE published by NVD on 2026-05-22. The supplied corpus does not include a KEV entry, due date, or exploit campaign attribution.