We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Analysis and contextual insights are available on OpenCVE Cloud.
Vendor Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
Wed, 25 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap
Qnap qunetswitch |
|
| CPEs | cpe:2.3:a:qnap:qunetswitch:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qnap
Qnap qunetswitch |
|
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap Systems
Qnap Systems qunetswitch |
|
| Vendors & Products |
Qnap Systems
Qnap Systems qunetswitch |
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-25T14:04:41.325Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22900
Updated: 2026-03-25T14:04:37.678Z
Status : Analyzed
Published: 2026-03-20T17:16:44.467
Modified: 2026-03-25T21:07:01.093
Link: CVE-2026-22900
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:20:40Z