Cyber Posture

CVE-2026-22897

CriticalRCE

Published: 20 March 2026

Published
20 March 2026
Modified
25 March 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0039 60.0th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-22897 is a critical-severity OS Command Injection (CWE-78) vulnerability in Qnap Qunetswitch. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 40.0% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-22897 by requiring timely flaw remediation through patching to QuNetSwitch version 2.0.4.0415 or later.

prevent

Prevents command injection exploitation by validating remote inputs to block arbitrary command execution payloads.

detect

Detects ongoing or successful command injection attacks by monitoring for indicators of unauthorized command execution on the system.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

CVE enables remote exploitation of a public-facing application (T1190) via command injection, directly facilitating arbitrary Unix shell command execution (T1059.004) on Linux-based QNAP systems.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

A command injection vulnerability has been reported to affect QuNetSwitch. The remote attackers can then exploit the vulnerability to execute arbitrary commands. We have already fixed the vulnerability in the following version: QuNetSwitch 2.0.4.0415 and later

Deeper analysisAI

CVE-2026-22897 is a command injection vulnerability (CWE-78) affecting QuNetSwitch, a component from QNAP. Published on 2026-03-20, it carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), indicating critical severity due to its potential for high-impact remote exploitation. The flaw allows remote attackers to execute arbitrary commands on affected systems.

Remote, unauthenticated attackers can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation grants attackers the ability to run arbitrary commands, potentially leading to full system compromise with high confidentiality, integrity, and availability impacts.

QNAP's security advisory (QSA-26-11) confirms the issue has been addressed in QuNetSwitch version 2.0.4.0415 and later, recommending immediate upgrades to mitigate the risk.

Details

CWE(s)

Affected Products

qnap
qunetswitch
2.0.1.13077 — 2.0.4.0415

CVEs Like This One

CVE-2026-22901Same product: Qnap Qunetswitch
CVE-2026-22900Same product: Qnap Qunetswitch
CVE-2024-50390Same product class: NAS / storage appliance
CVE-2025-30264Same product class: NAS / storage appliance
CVE-2024-56808Same product class: NAS / storage appliance
CVE-2024-14026Same product class: NAS / storage appliance
CVE-2025-54153Same product class: NAS / storage appliance
CVE-2024-53700Same product class: NAS / storage appliance
CVE-2025-44015Same product class: NAS / storage appliance
CVE-2025-59385Same product class: NAS / storage appliance

References