CVE-2026-27520
Published: 24 February 2026
Summary
CVE-2026-27520 is a high-severity Cleartext Storage of Sensitive Information (CWE-312) vulnerability in Binardat 10G08-0800Gsm Firmware. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Training on secure data handling discourages cleartext storage of sensitive information.
Data action mapping can detect storage actions that leave sensitive information in cleartext.
Configuration policies can mandate secure storage methods to avoid cleartext storage of sensitive information.
Policy requires protection measures such as encryption for sensitive data stored on media, preventing cleartext exposure.
Key-management policy requires protected storage of key material, preventing cleartext storage of sensitive cryptographic keys.
Requiring confidentiality protection for information at rest eliminates cleartext storage of sensitive data on persistent media.
Reduces cleartext storage of sensitive data when OPSEC identifies and mandates protection of key information artifacts.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vuln in web management interface (public-facing) enables remote credential recovery via insecure Base64 cookie storage (unsecured creds).
NVD Description
Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the…
more
cookie value can recover the plaintext password.
Deeper analysisAI
CVE-2026-27520 is a vulnerability in the Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209. The issue stems from the storage of a user password in a client-side cookie as a Base64-encoded value, which is accessible via the web management interface. Base64 encoding is reversible and provides no confidentiality, enabling straightforward recovery of the plaintext password. It is classified under CWE-312 (Cleartext Storage of Sensitive Information) with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
The vulnerability can be exploited by any network-accessible attacker with low complexity and no required privileges or user interaction. By obtaining the cookie value—potentially through network interception if the web interface lacks HTTPS enforcement, client-side access, or other means—an attacker can decode the Base64 content to retrieve the plaintext password. This grants high-impact confidentiality loss, allowing unauthorized access to the switch's management functions.
Advisories, including the VulnCheck report and Binardat's product page for the 8-port 10 Gigabit SFP+ managed switch, indicate that firmware version V300SP10260209 or later addresses the issue by remediating the insecure password storage. Security practitioners should verify and apply updates to affected devices, audit web interface configurations for secure cookie handling (e.g., HttpOnly and Secure flags), and monitor for unauthorized access.
Details
- CWE(s)