CVE-2026-27515
Predictable Session IDs in Binardat 10G08-0800GSM Enable Hijacking
Publication date: 2026-02-24
Last updated on: 2026-02-25
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| binardat | 10g08-0800gsm_firmware | to V300SP10260209 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-330 | The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Binardat 10G08-0800GSM network switch firmware versions prior to V300SP10260209 generate predictable numeric session identifiers in the web management interface.
Because the session IDs are not random enough, an attacker can guess valid session IDs.
This allows the attacker to hijack authenticated sessions without needing any privileges, user interaction, or authentication.
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'An attacker exploiting this vulnerability can hijack authenticated sessions on the network switch.'}, {'type': 'paragraph', 'content': "This can lead to unauthorized access to the device's management interface, compromising confidentiality and integrity of the system."}, {'type': 'paragraph', 'content': 'Since no privileges or user interaction are required, the attack is relatively easy to perform remotely over the network.'}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by identifying if your Binardat 10G08-0800GSM network switch is running a firmware version prior to V300SP10260209.'}, {'type': 'paragraph', 'content': 'Since the issue involves predictable numeric session identifiers in the web management interface, monitoring for suspicious session ID patterns or repeated session hijacking attempts could indicate exploitation.'}, {'type': 'paragraph', 'content': 'To check the firmware version on your device, you can use device-specific commands or access the web management interface to view the firmware version.'}, {'type': 'list_item', 'content': "Log into the switch's web management interface and check the firmware version displayed."}, {'type': 'list_item', 'content': "Use the device's CLI (if available) to run a command such as `show version` or `show firmware` to determine the current firmware version."}, {'type': 'paragraph', 'content': 'If you observe session IDs that are simple numeric sequences or can be predicted, this is a strong indicator of the vulnerability.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate and recommended mitigation step is to update the Binardat 10G08-0800GSM network switch firmware to version V300SP10260209 or later.
Updating the firmware addresses the vulnerability by improving the randomness of session identifiers, preventing attackers from guessing valid session IDs.
Until the firmware can be updated, consider restricting access to the web management interface to trusted networks or IP addresses to reduce the risk of session hijacking.
Additionally, monitor network traffic for unusual session activity and enforce strong network segmentation and access controls.