Impact
The flaw permits an attacker to bypass authentication by using a hardcoded string in the login mechanism, enabling unrestricted management of the switch. Consequently, an adversary could reconfigure network settings, expose confidential traffic, or create persistence channels, threatening the confidentiality, integrity, and availability of the network infrastructure.
Affected Systems
Belden’s GarrettCom Magnum 6K and 10K managed switches are affected. The vulnerability is present whenever the firmware includes the hardcoded authentication string, and no specific firmware ranges are listed, so any device still shipping with this flaw is potentially at risk.
Risk and Exploitability
A CVSS score of 9.3 indicates a severe risk level. No public exploit probability data is available, and the issue is not yet cataloged as a known exploited vulnerability, implying no widespread exploitation campaign is documented. The attacker would likely connect directly to the switch’s management interface over the network to leverage the hardcoded credentials; no privileged credentials are required, making the vulnerability highly attractive for compromise.
OpenCVE Enrichment