Cyber Posture

CVE-2026-27507

CriticalPublic PoC

Published: 24 February 2026

Published
24 February 2026
Modified
25 February 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-27507 is a critical-severity Use of Hard-coded Credentials (CWE-798) vulnerability in Binardat 10G08-0800Gsm Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 19.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 AC-2 (Account Management) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires changing default authenticators prior to first use and ensuring sufficient strength of mechanism, directly mitigating the use of unchangeable hard-coded administrative credentials.

prevent

Mandates changing default content of system accounts and establishing procedures for account management, preventing unauthorized full administrative access via hard-coded credentials.

prevent

Requires identification, reporting, testing, and installation of firmware updates to remediate flaws like hard-coded credentials, addressing the root cause of this CVE.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Hard-coded unchangeable admin credentials (CWE-798) on a remotely accessible web-managed switch directly enable use of default accounts for initial access (T1078.001) to external remote management services (T1133) and public-facing applications (T1190).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior contain hard-coded administrative credentials that cannot be changed by users. Knowledge of these credentials allows full administrative access to the device.

Deeper analysisAI

CVE-2026-27507 is a critical vulnerability in the Binardat 10G08-0800GSM network switch firmware, affecting version V300SP10260209 and prior releases. It involves hard-coded administrative credentials that users cannot modify, enabling full administrative access upon disclosure of these credentials. Classified as CWE-798 (Use of Hard-coded Credentials), the issue carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and was published on 2026-02-24.

The vulnerability can be exploited by any remote attacker with network access to the device, requiring no privileges, user interaction, or special complexity. Exploitation allows complete administrative control, compromising confidentiality, integrity, and availability to a high degree, such as reconfiguring the switch, extracting sensitive data, or disrupting network operations.

Advisories provide further details on the issue, including the VulnCheck advisory at https://www.vulncheck.com/advisories/binardat-10g08-0800gsm-network-switch-hard-coded-credentials and the vendor product page at https://www.binardat.com/products/8-port-10-gigabit-sfp-managed-switch,-support-1g-sfp-and-10g-sfp-module,-160gbps-bandwidth,-l3-web-managed,-metal-fanless-fiber-binardat-network-switch. Security practitioners should consult these sources for recommended mitigations, as no patch information is specified in the available details.

Details

CWE(s)

Affected Products

binardat
10g08-0800gsm firmware
≤ V300SP10260209

CVEs Like This One

CVE-2026-27515Same product: Binardat 10G08-0800Gsm
CVE-2026-27516Same product: Binardat 10G08-0800Gsm
CVE-2026-23678Same product: Binardat 10G08-0800Gsm
CVE-2026-27519Same product: Binardat 10G08-0800Gsm
CVE-2026-27520Same product: Binardat 10G08-0800Gsm
CVE-2026-27521Same product: Binardat 10G08-0800Gsm
CVE-2026-28255Shared CWE-798
CVE-2026-25202Shared CWE-798
CVE-2026-23647Shared CWE-798
CVE-2024-8893Shared CWE-798

References