CVE-2026-27519
Hard-Coded RC4 Key in Binardat Switch Firmware Enables Data Decryption
Publication date: 2026-02-24
Last updated on: 2026-02-25
Assigner: VulnCheck
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| binardat | 10g08-0800gsm_firmware | to V300SP10260209 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-321 | The product uses a hard-coded, unchangeable cryptographic key. |
| CWE-327 | The product uses a broken or risky cryptographic algorithm or protocol. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-27519 affects the Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and earlier. The vulnerability arises because the firmware uses a hard-coded RC4 encryption key embedded in client-side JavaScript.
Since the key is static and exposed, attackers can use it to decrypt protected values, effectively defeating the confidentiality protections intended by the encryption.
This issue is categorized under CWE-321 (Use of Hard-coded Cryptographic Key) and CWE-327 (Use of a Broken or Risky Cryptographic Algorithm).
How can this vulnerability impact me? :
Because the encryption key is hard-coded and exposed, an attacker can remotely decrypt sensitive information without needing any privileges or user interaction.
This compromises the confidentiality of data protected by the encryption, potentially exposing sensitive or private information handled by the network switch.
The vulnerability has a high severity rating with a CVSS v4 score of 8.7, indicating a significant risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability involves the use of a hard-coded RC4 encryption key embedded in client-side JavaScript on Binardat 10G08-0800GSM network switches with firmware version V300SP10260209 and prior.'}, {'type': 'paragraph', 'content': "To detect this vulnerability, you can inspect the client-side JavaScript served by the network switch for the presence of a static RC4 key. This can be done by capturing the network traffic or accessing the web interface's JavaScript files."}, {'type': 'paragraph', 'content': "Suggested commands include using tools like curl or wget to download the JavaScript files from the switch's web interface and then searching for RC4 keys or suspicious hard-coded cryptographic keys."}, {'type': 'list_item', 'content': 'curl http://<switch-ip>/path/to/javascript.js -o switch.js'}, {'type': 'list_item', 'content': "grep -i 'rc4' switch.js"}, {'type': 'list_item', 'content': "grep -Eo '([a-f0-9]{2}){16,}' switch.js # to find potential hex keys"}, {'type': 'paragraph', 'content': 'Additionally, network traffic analysis tools like Wireshark can be used to capture and analyze encrypted traffic to check if the encryption can be trivially decrypted using a known static key.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
[{'type': 'paragraph', 'content': 'Immediate mitigation steps include upgrading the firmware of the Binardat 10G08-0800GSM network switch to a version later than V300SP10260209 where this vulnerability is fixed.'}, {'type': 'paragraph', 'content': "If an upgrade is not immediately possible, restrict access to the switch's web interface to trusted networks only to reduce the risk of remote exploitation."}, {'type': 'paragraph', 'content': 'Monitor network traffic for suspicious activity and consider disabling any features that rely on the vulnerable RC4 encryption until a patch is applied.'}, {'type': 'paragraph', 'content': 'Contact the vendor or check official advisories for patches or workarounds addressing the hard-coded RC4 key issue.'}] [1]