Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password.
Metrics
Affected Vendors & Products
References
History
Wed, 25 Feb 2026 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Binardat
Binardat 10g08-0800gsm Network Switch |
|
| Vendors & Products |
Binardat
Binardat 10g08-0800gsm Network Switch |
Tue, 24 Feb 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 store a user password in a client-side cookie as a Base64-encoded value accessible via the web interface. Because Base64 is reversible and provides no confidentiality, an attacker who can access the cookie value can recover the plaintext password. | |
| Title | Binardat 10G08-0800GSM Network Switch Base64-encoded Password Stored in Cookie | |
| Weaknesses | CWE-312 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2026-02-24T15:07:41.085Z
Updated: 2026-02-24T15:07:41.085Z
Reserved: 2026-02-19T19:51:07.329Z
Link: CVE-2026-27520
No data.
Status : Awaiting Analysis
Published: 2026-02-24T16:24:09.813
Modified: 2026-02-24T21:52:01.367
Link: CVE-2026-27520
No data.