Description
Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.
Published: 2026-02-24
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Credential Disclosure
Action: Patch Now
AI Analysis

Impact

The firmware of the Binardat 10G08‑0800GSM network switch stores user passwords in a client‑side cookie encoded with Base64, which provides no confidentiality. Because Base64 is directly reversible, an attacker who can read the cookie value can recover the plaintext password and gain unauthorized access to the switch. This flaw exposes privileged credentials and could enable broader compromise of the network infrastructure.

Affected Systems

Binardat Ltd. 10G08‑0800GSM Network Switch, firmware versions prior to V300SP10260209, accessed through the web management interface. Only these early firmware releases are affected.

Risk and Exploitability

The vulnerability scores a CVSS of 8.7 and an EPSS of less than 1 %, and it is not listed in the CISA KEV catalog. Based on the description, it is inferred that attackers could obtain the client‑side cookie through direct web interface access, network traffic interception, or client‑side compromise, which would allow them to extract the stored password. The flaw is remotely exploitable via the web interface when the attacker has access to the user's browser environment.

Generated by OpenCVE AI on April 18, 2026 at 10:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the switch firmware to version V300SP10260209 or later to eliminate the storage of passwords in cookies.
  • Restrict access to the web management interface by firewall, VPN, or network segmentation so that only trusted administrators can reach it.
  • If an upgrade is not immediately possible, remove or block the cookie after login using a browser extension or manual deletion, and ensure password values are not stored client‑side.

Generated by OpenCVE AI on April 18, 2026 at 10:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware
CPEs cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:*
cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Binardat
Binardat 10g08-0800gsm Network Switch
Vendors & Products Binardat
Binardat 10g08-0800gsm Network Switch

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.
Title Binardat 10G08-0800GSM Network Switch Base64-encoded Password Stored in Cookie
Weaknesses CWE-312
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Binardat 10g08-0800gsm 10g08-0800gsm Firmware 10g08-0800gsm Network Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-02-26T21:28:10.307Z

Reserved: 2026-02-19T19:51:07.329Z

Link: CVE-2026-27520

cve-icon Vulnrichment

Updated: 2026-02-26T21:27:57.186Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-24T16:24:09.813

Modified: 2026-02-25T17:25:34.370

Link: CVE-2026-27520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T11:00:05Z

Weaknesses