A use of hard-coded password vulnerability has been reported to affect Hyper Data Protector. The remote attackers can then exploit the vulnerability to gain unauthorized access.
We have already fixed the vulnerability in the following version:
Hyper Data Protector 2.3.1.455 and later
References
| Link | Resource |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-25-48 | Vendor Advisory |
Configurations
History
16 Mar 2026, 17:53
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:qnap:hyper_data_protector:*:*:*:*:*:*:*:* | |
| References | () https://www.qnap.com/en/security-advisory/qsa-25-48 - Vendor Advisory | |
| First Time |
Qnap hyper Data Protector
Qnap |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
12 Mar 2026, 21:07
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
12 Mar 2026, 02:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-12 02:15
Updated : 2026-03-16 17:53
NVD link : CVE-2025-59388
Mitre link : CVE-2025-59388
CVE.ORG link : CVE-2025-59388
JSON object : View
Products Affected
qnap
- hyper_data_protector
CWE
CWE-259
Use of Hard-coded Password
