Skip to main content
Back to articles
// ARTICLE · INSTRUCTIONAL · UNIFI · FIRMWARE

When to update UniFi firmware, and when to wait

UniFi's default behaviour, out of the box, is to install firmware updates as soon as they are released. On a laptop or a phone, that policy is mostly defensible — the client can recover from a bad update. On a production residential network it is the wrong default. Ubiquiti publishes firmware on three parallel channels (Early Access, Release Candidate, Stable), stable releases occasionally regress, and the residential network is the one piece of infrastructure in the house that everyone depends on at the same time. The right cadence is not “always now” and not “never.” It is read the notes, wait one to three weeks, take a config backup, apply during a low-stakes window, and watch for forty-eight hours.

PublishedMay 15, 2026
Read time~11 minutes
TopicUniFi · Firmware · Update cadence
AudienceNetwork engineers · IT teams · homeowners
§ 01 · The default is auto-update — and why that’s wrong on a production home

Network gear is not a phone.

UniFi's out-of-the-box behaviour is to download and install new firmware automatically. The setting lives under Settings → Control Plane → Updates in the UniFi Network application, where the console and each individual device can be set to auto-update, scheduled-update, or notify-only.¹

For a single user with a single device, “always update immediately” is the right default. The blast radius is one device, the user can power-cycle or restore it, and the security benefit of being on the latest patches dominates the small risk of a regression. The 2025 Broadband Genie Router Security Survey makes the case for that default in stark terms: across 3,242 UK internet users surveyed, 84 percent had never updated their router's firmware.² Auto-update exists because the unattended baseline is that bad.

A multi-AP UniFi network in a production residence is a different kind of system. The blast radius is not one device — it is every laptop, every video call, every doorbell camera, every garage-door opener, every television, every smart-lock controller, every guest with a phone, all at once. The recovery from a bad update is not power-cycling one access point; it is rolling back the controller, restoring from backup, and in the worst case RMA'ing hardware that won't boot. The asymmetry is real, and the right answer is to take the human in the loop.

That means turning auto-update off — at the controller and at the device level — and replacing it with a deliberate cadence. The rest of this article is what that cadence looks like, why it matches Ubiquiti's own release process, and the two 2026 incidents that make the case more vividly than any theoretical argument.

§ 02 · How UniFi releases firmware

Three channels, three bug-discovery curves.

Ubiquiti ships UniFi software and firmware on three parallel channels, exposed through Site Manager and through the per-site Settings → Control Plane → Updates page. Each channel publishes the same version sequence at a different lag, and each has a different bug rate.³

ChannelCadenceAudienceBug rate
Early AccessFrequent — every week or twoOpt-in testers; new feature previewsHigh — by design
Release CandidatePeriodic — once a feature stabilisesPower users willing to surface regressionsMedium — most bugs caught here
Stable (Official)Slower — every few weeksProduction networks; the default channelLow — but not zero

Early Access is an opt-in: it has to be enabled at the account level on the Ubiquiti SSO account first, after which eligible site owners can flip Early Access on for Site Manager and select Early-Access channels for specific software and firmware components. On a production residence, Early Access should be off. Its purpose is exactly the opposite of what a production network needs.

The relevant fact for the rest of this article: every time Stable receives a new build, that build was on Release Candidate first, and was on Early Access before that. By the time a release reaches Stable, most of its serious regressions have been found and fixed — but not all of them. The U6+ 6.7.41 bricking incident discussed in the next section reached Stable. So did the CVE-2026-22557 path-traversal flaw shipped in 9.0.118 and earlier. The difference between a one-day-after-stable update and a three-week-after-stable update is the window in which the rest of the community discovers what slipped through.

§ 03 · Two recent examples that prove the case

The bug curve is not theoretical.

U6+ access points bricked by firmware 6.7.41 — February 2026

On 4 February 2026, Ubiquiti released firmware 6.7.41 for U6+ access points on the Stable channel. Within weeks, reports began collecting on community.ui.com and in the wider press from operators whose U6+ units had been rendered inert by the automatic update: a solid white LED, no boot sequence, no DHCP request, no ping response, no SSH, and reset procedures that failed to trigger recovery mode.

One commenter on the German-language coverage reported“more than 10 defective Ubiquity U6+ access points from customers,” all bricked after the same firmware push. The recovery path for many affected units required a USB-to-serial adapter and bootloader access — well outside the skill set of a typical home user, and reportedly difficult to RMA on units outside the two-year warranty window. A homeowner who had auto-update on was, for those weeks, one push away from the most-trafficked AP in the house becoming hardware that would not turn back on.

CVE-2026-22557 — path traversal, CVSS 10.0 — March 2026

The other direction of the same argument. On 18 March 2026, Ubiquiti published Security Advisory Bulletin 062 disclosing two vulnerabilities in the UniFi Network application. CVE-2026-22557 is a path-traversal flaw rated CVSS 10.0 — the maximum possible severity.“An unauthenticated attacker with network access to the UniFi management interface sends crafted requests that manipulate file path parameters” to achieve account takeover, including administrator access.

The advisory affected UniFi Network Application versions 10.1.85 and earlier on the Official Release channel, 10.2.93 and earlier on Release Candidate, and UniFi Express firmware shipping Network 9.0.114 and earlier. Fixed versions: 10.1.89, 10.2.97, and UniFi Express firmware 4.0.13 (which ships Network 9.0.118). Independent reporting noted that “because this is a path-traversal vulnerability, the technical complexity for an attacker to develop an exploit is relatively low,” and that this was the third maximum-severity vulnerability in the UniFi Network application within twelve months.

The two incidents pull in opposite directions and together define the cadence rule: 22557 says update fast, 6.7.41 says wait. Neither is the whole answer. The discipline is knowing which kind of release you are looking at before you apply it.

§ 04 · The opposite mistake

Firmware that hasn't been touched in two years is worse.

“Turn off auto-update” is half the instruction. The other half is “and replace it with a real cadence.” The most common audit finding on the firmware-update axis is not networks that auto-updated into a bug. It is networks where auto-update is on and works fine, alongside networks where someone turned auto-update off years ago and never replaced it with anything.

The Broadband Genie figure cited above — 84 percent of UK internet users surveyed had never updated their router's firmware — is the population-level version of this problem.² Inside that 84 percent are networks running firmware with disclosed and patched critical vulnerabilities; CVE-2026-22557 will be exploited on unpatched UniFi Network deployments for years after the patch ships, because the patch only protects networks that get the patch.

The cadence in the next section is therefore two-sided. It protects against the bad release that slipped through. It also protects against the worse problem of running known-vulnerable firmware because nobody opened the controller this quarter.

§ 05 · The cadence we use on production homes

Five steps, one decision per release.

  1. Read the release notes. Every UniFi Network application release and every device-firmware release has a notes page on community.ui.com under Releases. Scan for the words fixes, known issues, and security. If a release names a CVE with a high CVSS score, treat it as urgent and skip straight to step 3. Otherwise continue.
  2. Wait one to three weeks.This is the bug-discovery window. Scroll the same release notes page after a week or two and read the community replies; subscribe to the relevant community.ui.com release thread. If a regression has surfaced — the way the U6+ 6.7.41 thread did — it will be visible in those replies long before it reaches your network. Wait longer if the release includes a major architectural change (new UniFi Network major version, new UniFi OS major version, a kernel bump).
  3. Take a config backup before applying. In the UniFi Network application, navigate to Settings → Control Plane → Backups, click Download, and select either Settings Only for a quick rollback file or the full backup including data retention. The same screen exposes System Backups, which when enabled generates a cloud backup automatically each week and prior to each major update. Cloud Gateway owners can view all backups associated with their account at account.ui.com/backups.
  4. Apply during a low-stakes window. Not 7 PM on a weeknight when the household is on a video call. Not 9 AM on a Monday when the home-office calendar is full. A weekday morning when the house is empty, or a Sunday afternoon when someone is physically present to power-cycle a device if necessary, is the right window. If the network covers a small business, schedule it.
  5. Watch for forty-eight hours.Most firmware regressions surface within the first two days — a phone that stops roaming cleanly, a doorbell that goes offline, a smart-home device that refuses to associate. If the network is still happy at the 48-hour mark, the update was good. If it isn't, the backup taken in step 3 is the one-click recovery path.

Five steps, one decision per release. The decision is cheap to make when you know what to look for; the cost of skipping it is the U6+ 6.7.41 case.

§ 06 · How to disable auto-update

The exact menu path.

In the current UniFi Network application, the path is:

  1. Open the site in Site Manager (or local management at the console's IP / hostname).
  2. Navigate to Settings → Control Plane → Updates.
  3. Click the UniFi Console row to expose its update settings, and the UniFi Network Application row separately. Each can be configured independently.¹
  4. Set the release channel to Official (Stable) if it is not already. Early Access requires opt-in at the account level first; on a production residence, leave Early Access disabled at the account level entirely.
  5. Set the update mode to Manual, or to a scheduled window that gives you the wait-and-watch buffer. Many sites prefer scheduled (e.g. first Sunday of the month, 4 AM) so the cadence is enforced by the controller instead of by remembering to do it.

The same screen also exposes the notify-only mode for the few sites where you want the controller to alert you that an update exists without applying it. The Update Manager is the centralised hub for managing updates across multiple UniFi deployments under a single Ubiquiti SSO account, reachable on the web at unifi.ui.com and in the mobile app.¹

§ 07 · How to take a config backup before updating

The five-second insurance policy.

The backup is the difference between a bad update that costs an hour and a bad update that costs a weekend. There are two paths and both belong in the cadence.

Manual backup, on demand

Navigate to Settings → Control Plane → Backups. Click Download and choose:

  • Settings Only — a small file (typically a few megabytes) containing the network configuration: SSIDs, VLANs, firewall rules, port profiles, traffic rules, AP settings. This is what you want for a pre-firmware rollback.
  • Settings + Historical Data — adds traffic history, client device history, and Insight data. Larger file, slower to download, but useful when migrating to new hardware. Not required for a firmware rollback.

Save the file. Date it. Keep the last several in a dedicated folder (the cloud-sync folder of your choice, encrypted, is sensible — UniFi backups contain credential material).

Automatic cloud backups

On the same Backups page, enable System Backups. Once enabled, the controller generates a cloud backup automatically each week and additionally prior to each major update. These backups live under the Cloud Gateway owner's Ubiquiti account and are accessible at account.ui.com/backups. Note that only the Cloud Gateway Owner role has permission to manage them; in households where the AV integrator owns the gateway, the homeowner cannot recover from a bad update independently. (We have written separately about why the network owner is the right Owner role — see the cross-link at the bottom.)

§ 08 · When to update faster than the cadence

Named CVEs are the exception, not the rule.

The wait-one-to-three-weeks rule has a clear exception: a named security advisory with a high CVSS score that affects internet-reachable surface area. CVE-2026-22557 is exactly that case. It is rated CVSS 10.0, is unauthenticated, and an attacker need only reach the UniFi management interface — which on many home networks is intentionally exposed for remote administration. Independent analysis described the exploit complexity as “relatively low” and named it as the third maximum-severity flaw in the UniFi Network application inside a year.

For a release like that, the cadence is:

  1. Read the advisory the day it drops.
  2. Confirm your version is affected.
  3. Take a config backup (the cadence does not change — the backup is still the cheap insurance).
  4. Apply the patched release the same day.
  5. Watch for forty-eight hours, same as a normal update.

For a release that is “UniFi Network 9.3.45, bug fixes and minor improvements,” the normal one-to-three-week cadence applies.

The signal that distinguishes the two is whether the release notes name a CVE, what the CVSS score is, and whether the affected surface is network-reachable. If all three answer “yes,” treat it as urgent. Otherwise, wait.

§ 09 · Honest caveats

Where this article is firmer, and where it is softer.

  • Single-device sites are not the same as multi-AP sites.A home with one UniFi Express or one Cloud Gateway and no separate APs is closer to the “laptop” case than to the multi-AP case. Leaving auto-update on at that scale is more defensible. The cadence in this article is written for production networks with multiple devices.
  • Hosted-controller services run their own cadence.Operators like HostiFi publicly stage rolling updates across thousands of customer controllers and report transparently when they do — they ran 3,354 UniFi Network servers from earlier builds to 9.0.114 over a multi-week window in early 2026 and reported that none of the 571,800-plus connected Ubiquiti devices rebooted during the rollout. If your controller is hosted, the host's cadence applies and the section on disabling auto-update doesn't.
  • The wait window is not absolute. One to three weeks is a heuristic. For a release with a small surface area (one device line, a few bug fixes), one week is fine. For a major version bump (e.g. UniFi Network 9 → 10), three weeks is conservative and four is not unreasonable. The underlying rule is “long enough for the bug-discovery curve to flatten,” not a specific number of days.
  • This article does not name every recent firmware bug.We named two that are well-documented and verifiable end-to-end. There are more — the community.ui.com Releases page collects them as they appear.³ The pattern, not the inventory, is the point.
  • Auto-update is not always wrong. For a network you do not have time to manage at all, it is the lesser evil compared to never updating. The argument here is for the network the homeowner cares about — not for the abandoned router.
  • Release-channel naming changes. Ubiquiti has shipped under various combinations of “Early Access,” “Release Candidate,” “Stable Candidate,” and “Official.” The three-channel description in this article matches the current Site-Manager UI, but the labels in older controllers and in older help-centre articles may differ.³

None of these caveats changes the headline cadence: on a production residential UniFi network, disable auto-update, replace it with a deliberate read-wait-backup-apply-watch loop, and break the pattern only for named security advisories with high CVSS scores.

// REFERENCES

  1. [1]Ubiquiti Help Center — UniFi Updates. Source for the Settings → Control Plane → Updates menu path, the per-console and per-application update modes, the Update Manager hub, and the unifi.ui.com / mobile-app access points. help.ui.com — UniFi Updates
  2. [2]Broadband Genie — 2025 Router Security Research. UK-wide survey of 3,242 internet users conducted October 2025 (OnePoll, n=2,000) and April–September 2025 (online, n=1,342). Source for the “84 percent have never updated their router's firmware” statistic. broadband.co.uk — Router Security Research 2025
  3. [3]Ubiquiti Community — Releases. Canonical index of UniFi Network application, UniFi OS, and per-device firmware release notes, organised by channel. community.ui.com — Releases
  4. [4]Ubiquiti Help Center — Upgrading to Early Access in UniFi. Source for the account-level Early Access opt-in, the site-level enablement step, and the per-component channel selection in Site Manager. help.ui.com — Upgrading to Early Access
  5. [5]Born's Tech and Windows World — Ubiquiti Firmware-Update brickt U6+-Devices, 21 April 2026; community.ui.com release thread UniFi U6 Plus completely bricked — stuck before U-Boot; and U6+ bricked after upgrading to firmware 6.7.41 via official controller — No boot, no recovery. Source for the 6.7.41 release date (4 February 2026), the solid-white-LED symptom, the bootloader-recovery workaround, and the multi-customer reports. borncity.com — U6+ bricking · community.ui.com — 6.7.41 bricking thread
  6. [6]Ubiquiti Community — Security Advisory Bulletin 062, 18 March 2026. Discloses CVE-2026-22557 (path traversal, CVSS 10.0) and CVE-2026-22558 (authenticated NoSQL injection, privilege escalation, CVSS 7.7) in the UniFi Network application. Affected versions: ≤ 10.1.85 (Official), ≤ 10.2.93 (Release Candidate), ≤ 9.0.114 (UniFi Express). Fixed in 10.1.89, 10.2.97, and UniFi Express firmware 4.0.13. community.ui.com — Security Advisory 062
  7. [7]FirstPassLab — Ubiquiti UniFi CVE-2026-22557 (CVSS 10): Third Max-Severity Flaw in a Year — Why Network Engineers Must Patch Now, 21 March 2026. Source for the “technical complexity for an attacker to develop an exploit is relatively low” assessment and the “third maximum-severity vulnerability in twelve months” framing. firstpasslab.com — CVE-2026-22557
  8. [8]Ubiquiti Help Center — Backups and Migration in UniFi. Source for the Settings → Control Plane → Backups menu path, the Settings Only vs full-backup options, the System Backups auto-cloud-backup toggle (which generates a backup weekly and prior to each major update), and the account.ui.com/backups portal. help.ui.com — Backups and Migration
  9. [9]HostiFi — We've updated 3,354 UniFi servers to version 9.0.114, February 2026. Source for the staged-rollout case study: 3,354 UniFi Network servers updated to 9.0.114 over several weeks, with none of the 571,800 Ubiquiti devices connected to those servers being rebooted during the rollout. hostifi.com — 3,354-server rollout
  10. [10]Ubiquiti Help Center — UniFi Advanced Updating Techniques. Background reference for manual-update procedure, scheduled upgrades, multi-device update batching, and offline-cache downloading for high-volume networks. help.ui.com — Advanced Updating Techniques
// GET A REVIEW

Want a Health Check of your own UniFi network?

A read-only Health Check covers firmware versions and channels, auto-update settings, backup posture, and the exact remediation steps needed to bring a residential UniFi network up to a defensible cadence.