A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access.
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
We have already fixed the vulnerability in the following version:
QuNetSwitch 2.0.5.0906 and later
Advisories
No advisories yet.
Fixes
Solution
We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-26-11 |
|
History
Mon, 23 Mar 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap Systems
Qnap Systems qunetswitch |
|
| Vendors & Products |
Qnap Systems
Qnap Systems qunetswitch |
Fri, 20 Mar 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later | |
| Title | QuNetSwitch | |
| Weaknesses | CWE-798 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-20T16:21:25.342Z
Reserved: 2026-01-13T07:49:08.784Z
Link: CVE-2026-22900
No data.
Status : Awaiting Analysis
Published: 2026-03-20T17:16:44.467
Modified: 2026-03-24T15:54:09.400
Link: CVE-2026-22900
No data.
OpenCVE Enrichment
Updated: 2026-03-23T09:53:21Z
Weaknesses