Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27520: CWE-312 Cleartext Storage of Sensitive Information in Binardat Ltd. 10G08-0800GSM Network Switch

0
High
VulnerabilityCVE-2026-27520cvecve-2026-27520cwe-312
Published: Tue Feb 24 2026 (02/24/2026, 15:07:41 UTC)
Source: CVE Database V5
Vendor/Project: Binardat Ltd.
Product: 10G08-0800GSM Network Switch

Description

Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.

AI-Powered Analysis

AILast updated: 02/24/2026, 21:00:04 UTC

Technical Analysis

CVE-2026-27520 is a vulnerability classified under CWE-312 (Cleartext Storage of Sensitive Information) found in Binardat Ltd.'s 10G08-0800GSM network switch firmware versions prior to V300SP10260209. The vulnerability arises because the device stores user passwords in client-side cookies as Base64-encoded strings. Base64 encoding is not encryption; it is a reversible encoding scheme that does not provide confidentiality. Consequently, any attacker who can intercept or access the cookie value through the web interface can decode the Base64 string to retrieve the plaintext password. This flaw does not require any authentication or user interaction, making it trivially exploitable remotely if the attacker can access the web interface or intercept traffic. The vulnerability has a CVSS v4.0 score of 8.7, indicating high severity, with network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality. The vulnerability does not affect integrity or availability directly but compromises credential confidentiality, potentially allowing attackers to gain unauthorized administrative access to the network switch. No patches or firmware updates are currently linked, so mitigation relies on upgrading to firmware versions V300SP10260209 or later once available, or applying compensating controls such as restricting web interface access, using secure communication channels, and monitoring for suspicious activity. The vulnerability is significant because network switches are critical infrastructure components, and credential compromise can lead to broader network compromise.

Potential Impact

The primary impact of CVE-2026-27520 is the compromise of user credentials for the Binardat 10G08-0800GSM network switch. Unauthorized access to these credentials can allow attackers to log into the device's administrative web interface, leading to potential full control over the switch. This can result in network traffic interception, manipulation, denial of service, or pivoting to other internal systems. Since network switches are foundational to enterprise and service provider networks, their compromise can disrupt critical communications and data flows. The vulnerability's ease of exploitation (no authentication or user interaction required) increases the risk of automated or opportunistic attacks. Organizations relying on these switches for critical infrastructure, including telecommunications, data centers, and enterprise networks, face risks of data breaches, service outages, and regulatory non-compliance. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the high CVSS score and critical asset nature.

Mitigation Recommendations

1. Upgrade the firmware of Binardat 10G08-0800GSM network switches to version V300SP10260209 or later as soon as the patch becomes available from the vendor. 2. Until a patch is applied, restrict access to the web interface by implementing network segmentation and firewall rules to limit access only to trusted management hosts. 3. Enforce the use of HTTPS with strong TLS configurations to protect cookie transmission from interception. 4. Implement strict cookie security attributes such as Secure, HttpOnly, and SameSite flags to reduce the risk of cookie theft via client-side attacks. 5. Monitor network switch logs and network traffic for unusual access patterns or unauthorized login attempts. 6. Consider deploying network intrusion detection/prevention systems (IDS/IPS) to detect attempts to exploit this vulnerability. 7. Educate administrators about the risk of storing sensitive information client-side and encourage strong password policies and multi-factor authentication if supported. 8. If possible, disable or limit the use of client-side cookies for authentication or session management until the vulnerability is resolved. 9. Conduct regular security audits and vulnerability scans on network infrastructure devices to detect similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-02-19T19:51:07.329Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699e0f3fbe58cf853b290d88

Added to database: 2/24/2026, 8:51:11 PM

Last enriched: 2/24/2026, 9:00:04 PM

Last updated: 2/25/2026, 12:15:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats