{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59388","assignerOrgId":"2fd009eb-170a-4625-932b-17a53af1051f","state":"PUBLISHED","assignerShortName":"qnap","dateReserved":"2025-09-15T08:35:00.660Z","datePublished":"2026-03-12T01:41:44.725Z","dateUpdated":"2026-03-12T13:16:43.495Z"},"containers":{"cna":{"providerMetadata":{"orgId":"2fd009eb-170a-4625-932b-17a53af1051f","shortName":"qnap","dateUpdated":"2026-03-12T01:41:44.725Z"},"title":"Hyper Data Protector","problemTypes":[{"descriptions":[{"lang":"en","cweId":"CWE-259","description":"CWE-259","type":"CWE"}]}],"impacts":[{"capecId":"CAPEC-191","descriptions":[{"lang":"en","value":"CAPEC-191"}]}],"affected":[{"vendor":"QNAP Systems Inc.","product":"Hyper Data Protector","versions":[{"status":"affected","version":"2.3.x","lessThan":"2.3.1.455","versionType":"custom"}],"defaultStatus":"unaffected"}],"descriptions":[{"lang":"en","value":"A use of hard-coded password vulnerability has been reported to affect Hyper Data Protector. The remote attackers can then exploit the vulnerability to gain unauthorized access.\n\nWe have already fixed the vulnerability in the following version:\nHyper Data Protector 2.3.1.455 and later","supportingMedia":[{"type":"text/html","base64":false,"value":"A use of hard-coded password vulnerability has been reported to affect Hyper Data Protector. The remote attackers can then exploit the vulnerability to gain unauthorized access.<br><br>We have already fixed the vulnerability in the following version:<br>Hyper Data Protector 2.3.1.455 and later<br>"}]}],"references":[{"url":"https://www.qnap.com/en/security-advisory/qsa-25-48"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"NONE","userInteraction":"NONE","vulnConfidentialityImpact":"NONE","subConfidentialityImpact":"NONE","vulnIntegrityImpact":"HIGH","subIntegrityImpact":"NONE","vulnAvailabilityImpact":"NONE","subAvailabilityImpact":"NONE","exploitMaturity":"UNREPORTED","Safety":"NOT_DEFINED","Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","valueDensity":"NOT_DEFINED","vulnerabilityResponseEffort":"NOT_DEFINED","providerUrgency":"NOT_DEFINED","version":"4.0","baseSeverity":"MEDIUM","baseScore":6.6,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U"}}],"solutions":[{"lang":"en","value":"We have already fixed the vulnerability in the following version:\nHyper Data Protector 2.3.1.455 and later","supportingMedia":[{"type":"text/html","base64":false,"value":"We have already fixed the vulnerability in the following version:<br>Hyper Data Protector 2.3.1.455 and later<br>"}]}],"credits":[{"lang":"en","value":"Pwn2Own 2025 - Summoning Team","type":"finder"}],"source":{"advisory":"QSA-25-48","discovery":"EXTERNAL"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-03-12T13:16:34.638565Z","id":"CVE-2025-59388","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-12T13:16:43.495Z"}}]}}