Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22900: CWE-798 in QNAP Systems Inc. QuNetSwitch

0
Medium
VulnerabilityCVE-2026-22900cvecve-2026-22900cwe-798
Published: Fri Mar 20 2026 (03/20/2026, 16:21:25 UTC)
Source: CVE Database V5
Vendor/Project: QNAP Systems Inc.
Product: QuNetSwitch

Description

A use of hard-coded credentials vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.5.0906 and later

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/27/2026, 22:37:01 UTC

Technical Analysis

CVE-2026-22900 identifies a security vulnerability in QNAP Systems Inc.'s QuNetSwitch software, specifically versions 2.0.x, due to the presence of hard-coded credentials (CWE-798). Hard-coded credentials are embedded fixed usernames or passwords within the software code, which cannot be changed by users and are often discovered by attackers through reverse engineering or leaked documentation. This vulnerability allows remote attackers to bypass authentication mechanisms entirely, gaining unauthorized access to the affected system. The CVSS 4.0 base score is 6.8, reflecting a medium severity level, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The vulnerability impacts system availability and integrity significantly (VA:H, VI:L) but has limited confidentiality impact (VC:L). The flaw does not require any authentication or user interaction, making it easier to exploit remotely. QNAP has addressed this issue in QuNetSwitch version 2.0.5.0906 and later, urging users to upgrade. No public exploits or active exploitation have been reported to date. The vulnerability poses a risk primarily to organizations deploying QuNetSwitch 2.0.x, potentially allowing attackers to disrupt network operations or manipulate system functions.

Potential Impact

The exploitation of CVE-2026-22900 can lead to unauthorized remote access to QuNetSwitch devices, enabling attackers to compromise system integrity and availability. Attackers could disrupt network switching functions, potentially causing denial of service or manipulation of network traffic. Although confidentiality impact is limited, unauthorized access could facilitate further lateral movement within an organization's network or enable the deployment of additional malicious payloads. Organizations relying on QuNetSwitch 2.0.x in critical infrastructure or enterprise environments may face operational disruptions, data integrity issues, and increased risk of broader network compromise. The ease of exploitation without authentication or user interaction increases the threat level, especially in environments exposed to untrusted networks. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade all QuNetSwitch installations from version 2.0.x to version 2.0.5.0906 or later, where the hard-coded credential issue has been resolved. Network administrators should audit existing devices to identify vulnerable versions and remove or isolate them from untrusted networks until patched. Implement network segmentation and strict access controls to limit exposure of QuNetSwitch devices to only trusted management networks. Employ network monitoring and intrusion detection systems to detect anomalous access attempts targeting QuNetSwitch devices. Avoid using default or hard-coded credentials in any network equipment and enforce credential management best practices. Regularly review vendor advisories and apply security patches promptly. Additionally, consider multi-factor authentication and encrypted management channels where supported to further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
qnap
Date Reserved
2026-01-13T07:49:08.784Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69bdbd93e2bf98efc48d0f6c

Added to database: 3/20/2026, 9:35:15 PM

Last enriched: 3/27/2026, 10:37:01 PM

Last updated: 5/2/2026, 9:44:20 AM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses