Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
Published: 2026-02-24
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Full administrative access via hard‑coded credentials
Action: Immediate Patch
AI Analysis

Impact

Firmware version V300SP10260209 and earlier embed immutable administrative credentials that cannot be altered by users. Possession of these credentials grants complete control over the switch, enabling configuration changes, network traffic manipulation, and potential lateral movement. The vulnerability is a direct result of improper credential management (CWE‑798).

Affected Systems

Binardat Ltd.’s 10G08-0800GSM Network Switch is affected. All firmware releases up to and including V300SP10260209 possess the hard‑coded credential flaw.

Risk and Exploitability

The CVSS score of 9.3 indicates a critical severity, while the EPSS score of < 1% suggests that exploitation events are currently rare but not impossible. The switch’s web‑based management interface is likely the attack surface; remote attackers who can reach the device’s management port may use the known credentials to gain full administrative control. The vulnerability is not listed in the CISA KEV catalog, but its high severity warrants caution.

Generated by OpenCVE AI on April 17, 2026 at 15:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest firmware update from Binardat, which removes the hard‑coded administrative credentials.
  • If a firmware update cannot be applied, block remote access to the device’s management interface until a patch is released, for example by using firewall rules or VLAN isolation.
  • Continuously monitor management logs for suspicious administrative activity.

Generated by OpenCVE AI on April 17, 2026 at 15:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
First Time appeared Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware
CPEs cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:*
cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Binardat
Binardat 10g08-0800gsm Network Switch
Vendors & Products Binardat
Binardat 10g08-0800gsm Network Switch

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.
Title Binardat 10G08-0800GSM Network Switch Hard-coded Credentials
Weaknesses CWE-798
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Binardat 10g08-0800gsm 10g08-0800gsm Firmware 10g08-0800gsm Network Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-27T18:59:14.424Z

Reserved: 2026-02-19T19:51:07.327Z

Link: CVE-2026-27507

cve-icon Vulnrichment

Updated: 2026-02-27T18:59:08.798Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T16:24:08.617

Modified: 2026-02-25T17:05:34.330

Link: CVE-2026-27507

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T16:00:11Z

Weaknesses