Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27518: CWE-352 Cross-Site Request Forgery (CSRF) in Binardat Ltd. 10G08-0800GSM Network Switch

0
Medium
VulnerabilityCVE-2026-27518cvecve-2026-27518cwe-352
Published: Tue Feb 24 2026 (02/24/2026, 15:06:39 UTC)
Source: CVE Database V5
Vendor/Project: Binardat Ltd.
Product: 10G08-0800GSM Network Switch

Description

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior lack CSRF protections for state-changing actions in the administrative interface. An attacker can trick an authenticated administrator into performing unauthorized configuration changes.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/04/2026, 18:57:56 UTC

Technical Analysis

CVE-2026-27518 identifies a Cross-Site Request Forgery (CSRF) vulnerability in the Binardat Ltd. 10G08-0800GSM network switch firmware version V300SP10260209 and prior. The vulnerability stems from the absence of CSRF protections on the administrative web interface for state-changing operations. CSRF attacks exploit the trust a web application places in an authenticated user by tricking them into submitting unauthorized requests. In this case, an attacker can craft malicious web content that, when visited by an authenticated administrator, causes the switch to execute unintended configuration changes without the administrator's explicit consent. The vulnerability requires the administrator to be logged into the device’s web interface and to interact with the attacker-controlled content, making user interaction necessary. The CVSS 4.0 vector indicates the attack can be performed remotely over the network with low complexity and no privileges, but user interaction is required. The impact primarily affects the integrity of the device configuration, potentially leading to network disruptions or unauthorized access if configurations are altered maliciously. No patches or mitigations have been officially released by Binardat Ltd. at the time of publication, and no known exploits have been observed in the wild. This vulnerability highlights the importance of implementing anti-CSRF tokens or similar protections in web-based administrative interfaces of network devices.

Potential Impact

The primary impact of this vulnerability is on the integrity of network switch configurations. Unauthorized configuration changes can lead to network outages, degraded performance, or the introduction of backdoors and unauthorized access paths. For organizations relying on the Binardat 10G08-0800GSM switches, this could result in compromised network security, potential data breaches, and operational disruptions. Since the attack requires an authenticated administrator and user interaction, the risk is somewhat mitigated but remains significant in environments where administrators may be targeted via phishing or social engineering. The absence of CSRF protections also indicates a potential gap in secure development practices for the device’s firmware, which could imply other undisclosed vulnerabilities. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure. Organizations with critical infrastructure relying on these switches could face severe operational impacts if exploited.

Mitigation Recommendations

1. Restrict access to the administrative interface by implementing network segmentation and firewall rules to limit management access only to trusted networks or VPNs. 2. Enforce strong authentication mechanisms for administrators, including multi-factor authentication where possible, to reduce the risk of credential compromise. 3. Educate administrators about phishing and social engineering risks to minimize the chance of interacting with malicious content. 4. Monitor network switch configuration changes and administrative access logs for unusual or unauthorized activity to detect potential exploitation attempts early. 5. Deploy web application firewalls (WAFs) or intrusion detection systems (IDS) that can detect and block CSRF attack patterns targeting the administrative interface. 6. Regularly check for firmware updates or patches from Binardat Ltd. and apply them promptly once available to remediate the vulnerability. 7. If feasible, implement additional protective controls such as isolating management interfaces on dedicated VLANs or out-of-band management networks to reduce exposure. 8. Consider using browser security settings or extensions that can block cross-site requests or scripts from untrusted sources to reduce the risk of CSRF attacks.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T19:51:07.328Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3ebe58cf853b290d71

Added to database: 2/24/2026, 8:51:10 PM

Last enriched: 3/4/2026, 6:57:56 PM

Last updated: 4/10/2026, 5:29:56 AM

Views: 58

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses