Cyber Posture

CVE-2017-20234

CriticalPublic PoC

Published: 03 April 2026

Published
03 April 2026
Modified
07 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2017-20234 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Belden (inferred from references). Its CVSS base score is 9.8 (Critical).

Operationally, ranked at the 3.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the CVE by requiring identification, reporting, and timely correction of the authentication bypass flaw through vendor patches or upgrades.

prevent

Prevents exploitation of hardcoded strings in authentication by mandating proper management, protection, and changes to authenticators, prohibiting hard-coded credentials.

prevent

Enforces secure configuration settings for authentication mechanisms on the switches to avoid reliance on vulnerable hardcoded bypass strings.

NVD Description

GarrettCom Magnum 6K and 10K managed switches contain an authentication bypass vulnerability that allows unauthenticated attackers to gain unauthorized access by exploiting a hardcoded string in the authentication mechanism. Attackers can bypass login controls to access administrative functions and sensitive…

more

switch configuration without valid credentials.

Deeper analysisAI

CVE-2017-20234 is an authentication bypass vulnerability in GarrettCom Magnum 6K and 10K managed switches. The flaw stems from a hardcoded string within the authentication mechanism, enabling attackers to circumvent login controls and gain unauthorized access to administrative functions and sensitive switch configurations without valid credentials. Published on 2026-04-03, it is associated with CWE-798 (Use of Hard-coded Credentials) and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), classifying it as critical.

Unauthenticated attackers with network access to the affected switches can exploit this vulnerability remotely with low complexity and no user interaction or privileges required. Successful exploitation grants full administrative access, allowing attackers to view, modify, or disrupt switch configurations, potentially leading to network compromise, data exposure, or service disruption.

Advisories provide guidance on mitigation, including details in the Belden Security Bulletin (MNS-6K-10K-GarrettCom-BSECV-2017-08) at https://assets.belden.com/m/114be964b4651983/original/Security-Bulletin-MNS-6K-10K-GarrettCom-BSECV-2017-08.pdf and the VulnCheck advisory at https://www.vulncheck.com/advisories/garrettcom-magnum-6k-and-10k-authentication-bypass-via-hardcoded-string. Security practitioners should consult these resources for patch availability, workarounds, and upgrade recommendations.

Details

CWE(s)

Affected Products

Belden
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-24346Shared CWE-798
CVE-2025-27643Shared CWE-798
CVE-2025-35451Shared CWE-798
CVE-2025-40537Shared CWE-798
CVE-2024-53356Shared CWE-798
CVE-2025-7401Shared CWE-798
CVE-2025-26410Shared CWE-798
CVE-2025-1393Shared CWE-798
CVE-2026-25202Shared CWE-798
CVE-2026-23647Shared CWE-798

References