PatchSiren cyber security CVE debrief
CVE-2026-34911 Ubiquiti Inc CVE debrief
CVE-2026-34911 is a high-severity path traversal issue (CWE-22) affecting UniFi OS devices. The supplied record says a network-accessible attacker with low privileges could reach files on the underlying system and potentially expose sensitive information. The CVSS v3.1 vector indicates no user interaction, low attack complexity, and high confidentiality impact.
- Vendor
- Ubiquiti Inc
- Product
- UniFi OS Server
- CVSS
- HIGH 7.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-22
- Original CVE updated
- 2026-05-22
- Advisory published
- 2026-05-22
- Advisory updated
- 2026-05-22
Who should care
Organizations operating UniFi OS devices should review this promptly, especially if those systems are reachable from user networks or hold sensitive configuration or identity data. Security and infrastructure teams responsible for device hardening, access control, and monitoring should assess whether low-privileged network users can reach the affected surface.
Technical summary
The NVD record maps the flaw to CWE-22 and gives CVSS v3.1 AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N (7.7 High). Based on the supplied description, the issue is a path traversal condition in UniFi OS devices that can expose files on the underlying system, creating a confidentiality risk. No integrity or availability impact is indicated in the provided CVSS vector.
Defensive priority
High. The issue is network-reachable, requires only low privileges, needs no user interaction, and has high confidentiality impact. Even though no KEV date is supplied, the combination of accessibility and data exposure risk makes this a prompt remediation item.
Recommended defensive actions
- Review the official UniFi advisory linked in the record and apply any fixed release or mitigation it specifies.
- Restrict access to UniFi OS management and related services to trusted networks and administrators only.
- Reduce exposure of low-privilege accounts and verify that file/path handling is not reachable from untrusted users.
- Monitor logs and alerts for unusual file access, path manipulation, or unexpected disclosure of sensitive configuration data.
- After remediation, validate that sensitive files are no longer accessible from the affected interface and rotate any credentials or secrets that may have been exposed.
Evidence notes
All core facts in this debrief come from the supplied NVD record and its linked Ubiquiti community advisory reference. The supplied metadata identifies the weakness as CWE-22 and provides the CVSS vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N. No CISA KEV entry, KEV due date, or ransomware campaign association is present in the supplied data. The vendor attribution metadata is low confidence, but the description explicitly names UniFi OS devices.
Official resources
-
CVE-2026-34911 CVE record
CVE.org
-
CVE-2026-34911 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
The supplied CVE record and source item are both dated 2026-05-22T02:16:34.667Z. No KEV dates are provided in the supplied data.