We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Project Subscriptions
No advisories yet.
Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
Wed, 25 Mar 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap
Qnap qunetswitch |
|
| CPEs | cpe:2.3:a:qnap:qunetswitch:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Qnap
Qnap qunetswitch |
|
| Metrics |
cvssV3_1
|
Wed, 25 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap Systems
Qnap Systems qunetswitch |
|
| Vendors & Products |
Qnap Systems
Qnap Systems qunetswitch |
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-25T14:04:41.325Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22900
Updated: 2026-03-25T14:04:37.678Z
Status : Analyzed
Published: 2026-03-20T17:16:44.467
Modified: 2026-03-25T21:07:01.093
Link: CVE-2026-22900
No data.
OpenCVE Enrichment
Updated: 2026-03-26T12:20:40Z