Impact
The firmware of the Binardat 10G08‑0800GSM network switch stores user passwords in a client‑side cookie encoded with Base64, which provides no confidentiality. Because Base64 is directly reversible, an attacker who can read the cookie value can recover the plaintext password and gain unauthorized access to the switch. This flaw exposes privileged credentials and could enable broader compromise of the network infrastructure.
Affected Systems
Binardat Ltd. 10G08‑0800GSM Network Switch, firmware versions prior to V300SP10260209, accessed through the web management interface. Only these early firmware releases are affected.
Risk and Exploitability
The vulnerability scores a CVSS of 8.7 and an EPSS of less than 1 %, and it is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers could obtain the client‑side cookie through direct web interface access, network traffic interception, or client‑side compromise, which would allow them to extract the stored password. The flaw is remotely exploitable via the web interface when the attacker has access to the user's browser environment.
OpenCVE Enrichment