We have already fixed the vulnerability in the following version:
Hyper Data Protector 2.3.1.455 and later
No advisories yet.
Solution
We have already fixed the vulnerability in the following version: Hyper Data Protector 2.3.1.455 and later
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://www.qnap.com/en/security-advisory/qsa-25-48 |
|
Thu, 12 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Qnap Systems
Qnap Systems hyper Data Protector |
|
| Vendors & Products |
Qnap Systems
Qnap Systems hyper Data Protector |
Thu, 12 Mar 2026 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A use of hard-coded password vulnerability has been reported to affect Hyper Data Protector. The remote attackers can then exploit the vulnerability to gain unauthorized access. We have already fixed the vulnerability in the following version: Hyper Data Protector 2.3.1.455 and later | |
| Title | Hyper Data Protector | |
| Weaknesses | CWE-259 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: qnap
Published:
Updated: 2026-03-12T13:16:43.495Z
Reserved: 2025-09-15T08:35:00.660Z
Link: CVE-2025-59388
Updated: 2026-03-12T13:16:38.505Z
Status : Received
Published: 2026-03-12T02:15:58.223
Modified: 2026-03-12T02:15:58.223
Link: CVE-2025-59388
No data.
OpenCVE Enrichment
Updated: 2026-03-12T09:54:52Z