Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27507: CWE-798 Use of Hard-coded Credentials in Binardat Ltd. 10G08-0800GSM Network Switch

0
Critical
VulnerabilityCVE-2026-27507cvecve-2026-27507cwe-798
Published: Tue Feb 24 2026 (02/24/2026, 15:04:16 UTC)
Source: CVE Database V5
Vendor/Project: Binardat Ltd.
Product: 10G08-0800GSM Network Switch

Description

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.

AI-Powered Analysis

AILast updated: 02/24/2026, 20:58:08 UTC

Technical Analysis

CVE-2026-27507 identifies a severe security vulnerability in the firmware of Binardat Ltd.'s 10G08-0800GSM network switch, specifically versions V300SP10260209 and earlier. The core issue is the presence of hard-coded administrative credentials embedded within the device firmware that users cannot modify or disable. These credentials provide full administrative privileges, enabling an attacker who knows them to completely control the device remotely. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), a well-known security weakness that undermines device security by allowing unauthorized access. The CVSS 4.0 base score of 9.3 reflects the vulnerability's critical nature, with an attack vector that is network-based (AV:N), requiring no privileges (PR:N), no user interaction (UI:N), and no authentication (AT:N). The impact on confidentiality, integrity, and availability is high, as an attacker can manipulate configurations, intercept or redirect network traffic, disrupt network operations, or use the device as a foothold for further attacks. No patches or firmware updates have been released at the time of publication, and no active exploits have been detected in the wild. The vulnerability affects all devices running the specified firmware version or earlier, making it a widespread risk for organizations deploying these switches. Given the device's role in network infrastructure, exploitation could have cascading effects on enterprise and service provider networks.

Potential Impact

The impact of CVE-2026-27507 is substantial for organizations worldwide that utilize Binardat 10G08-0800GSM network switches. An attacker gaining administrative access can alter network configurations, disable security controls, intercept or reroute sensitive data, and cause network outages or degradation of service. This can lead to data breaches, loss of network integrity, and operational disruptions. Critical infrastructure providers, telecommunications companies, and enterprises relying on these switches for core network connectivity face heightened risks. The inability to change the hard-coded credentials means that even well-managed networks are vulnerable if the credentials become publicly known or are leaked. The lack of patches exacerbates the risk, forcing organizations to rely on network segmentation and monitoring as interim defenses. Additionally, attackers could leverage compromised switches as pivot points for lateral movement within networks, increasing the scope of potential damage.

Mitigation Recommendations

Given the absence of available patches, organizations should implement immediate compensating controls. These include isolating affected switches from untrusted or public networks, restricting management access to trusted administrative networks only, and employing strict network segmentation to limit exposure. Deploy network intrusion detection/prevention systems (IDS/IPS) to monitor for unauthorized access attempts or anomalous administrative activity on these devices. Change default management protocols to use encrypted channels and enforce strong access control policies where possible. Maintain rigorous logging and real-time alerting on device management interfaces. Engage with Binardat Ltd. for firmware updates or official remediation timelines and consider replacing affected hardware if feasible. Additionally, conduct regular audits of network device configurations and credentials to detect unauthorized changes promptly. Organizations should also prepare incident response plans specifically addressing potential compromise of network infrastructure devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T19:51:07.327Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3ebe58cf853b290d53

Added to database: 2/24/2026, 8:51:10 PM

Last enriched: 2/24/2026, 8:58:08 PM

Last updated: 2/24/2026, 11:21:08 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats