Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement rate limiting or account lockout on failed login attempts, enabling brute-force attacks against user credentials.
Published: 2026-02-24
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Brute-Force Authentication
Action: Patch Immediately
AI Analysis

Impact

The firmware of the Binardat 10G08-0800GSM network switch does not enforce a limit on failed login attempts or account lockout, allowing attackers to attempt unlimited brute‑force attacks against user credentials. This flaw can expose the switch’s administrative interface to credential compromise, leading to full control over network configuration and potentially broader network compromise. The weakness is classified as CWE‑307, reflecting insecure authentication practices that enable unauthorized access via brute force.

Affected Systems

Vendors affected are Binardat Ltd. The 10G08‑0800GSM network switch, specifically firmware versions V300SP10260209 and earlier, is impacted. Users running these models are at risk if they rely on the default management interfaces (e.g., web, SSH, Telnet) for administration.

Risk and Exploitability

The CVSS v3.1 score of 6.9 indicates a moderate severity with potential confidentiality, integrity, and availability impact. The EPSS score is below 1%, suggesting low but non‑zero exploitation probability in the current landscape. The issue is not listed in CISA’s KEV, but the lack of rate limiting still permits brute‑force attacks over an exposed management interface, typically the network, and can be exploited remotely by attackers who can reach the switch’s management ports.

Generated by OpenCVE AI on April 16, 2026 at 16:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the switch firmware to a version that implements login rate limiting or account lockout.
  • Configure the switch’s management interfaces to accept connections only from trusted IP ranges and block all other sources.
  • Continuously monitor the device’s log for repeated failed login attempts and block or rate‑limit the offending IPs.

Generated by OpenCVE AI on April 16, 2026 at 16:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 02 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Thu, 26 Feb 2026 23:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware
CPEs cpe:2.3:h:binardat:10g08-0800gsm:-:*:*:*:*:*:*:*
cpe:2.3:o:binardat:10g08-0800gsm_firmware:*:*:*:*:*:*:*:*
Vendors & Products Binardat 10g08-0800gsm
Binardat 10g08-0800gsm Firmware

Wed, 25 Feb 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Binardat
Binardat 10g08-0800gsm Network Switch
Vendors & Products Binardat
Binardat 10g08-0800gsm Network Switch

Tue, 24 Feb 2026 15:45:00 +0000

Type Values Removed Values Added
Description Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior do not implement rate limiting or account lockout on failed login attempts, enabling brute-force attacks against user credentials.
Title Binardat 10G08-0800GSM Network Switch Missing Login Rate Limiting
Weaknesses CWE-307
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Binardat 10g08-0800gsm 10g08-0800gsm Firmware 10g08-0800gsm Network Switch
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-02T14:49:41.824Z

Reserved: 2026-02-19T19:51:07.329Z

Link: CVE-2026-27521

cve-icon Vulnrichment

Updated: 2026-02-26T21:19:44.440Z

cve-icon NVD

Status : Modified

Published: 2026-02-24T16:24:10.000

Modified: 2026-03-02T15:16:37.433

Link: CVE-2026-27521

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses