CVE-2026-27519
Received Received - Intake
Hard-Coded RC4 Key in Binardat Switch Firmware Enables Data Decryption

Publication date: 2026-02-24

Last updated on: 2026-02-25

Assigner: VulnCheck

Description
Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and prior use RC4 with a hard-coded key embedded in client-side JavaScript. Because the key is static and exposed, an attacker can decrypt protected values and defeat confidentiality protections.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-24
Last Modified
2026-02-25
Generated
2026-05-07
AI Q&A
2026-02-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
binardat 10g08-0800gsm_firmware to V300SP10260209 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-321 The product uses a hard-coded, unchangeable cryptographic key.
CWE-327 The product uses a broken or risky cryptographic algorithm or protocol.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27519 affects the Binardat 10G08-0800GSM network switch firmware version V300SP10260209 and earlier. The vulnerability arises because the firmware uses a hard-coded RC4 encryption key embedded in client-side JavaScript.

Since the key is static and exposed, attackers can use it to decrypt protected values, effectively defeating the confidentiality protections intended by the encryption.

This issue is categorized under CWE-321 (Use of Hard-coded Cryptographic Key) and CWE-327 (Use of a Broken or Risky Cryptographic Algorithm).


How can this vulnerability impact me? :

Because the encryption key is hard-coded and exposed, an attacker can remotely decrypt sensitive information without needing any privileges or user interaction.

This compromises the confidentiality of data protected by the encryption, potentially exposing sensitive or private information handled by the network switch.

The vulnerability has a high severity rating with a CVSS v4 score of 8.7, indicating a significant risk.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves the use of a hard-coded RC4 encryption key embedded in client-side JavaScript on Binardat 10G08-0800GSM network switches with firmware version V300SP10260209 and prior.'}, {'type': 'paragraph', 'content': "To detect this vulnerability, you can inspect the client-side JavaScript served by the network switch for the presence of a static RC4 key. This can be done by capturing the network traffic or accessing the web interface's JavaScript files."}, {'type': 'paragraph', 'content': "Suggested commands include using tools like curl or wget to download the JavaScript files from the switch's web interface and then searching for RC4 keys or suspicious hard-coded cryptographic keys."}, {'type': 'list_item', 'content': 'curl http://<switch-ip>/path/to/javascript.js -o switch.js'}, {'type': 'list_item', 'content': "grep -i 'rc4' switch.js"}, {'type': 'list_item', 'content': "grep -Eo '([a-f0-9]{2}){16,}' switch.js # to find potential hex keys"}, {'type': 'paragraph', 'content': 'Additionally, network traffic analysis tools like Wireshark can be used to capture and analyze encrypted traffic to check if the encryption can be trivially decrypted using a known static key.'}] [1]


What immediate steps should I take to mitigate this vulnerability?

[{'type': 'paragraph', 'content': 'Immediate mitigation steps include upgrading the firmware of the Binardat 10G08-0800GSM network switch to a version later than V300SP10260209 where this vulnerability is fixed.'}, {'type': 'paragraph', 'content': "If an upgrade is not immediately possible, restrict access to the switch's web interface to trusted networks only to reduce the risk of remote exploitation."}, {'type': 'paragraph', 'content': 'Monitor network traffic for suspicious activity and consider disabling any features that rely on the vulnerable RC4 encryption until a patch is applied.'}, {'type': 'paragraph', 'content': 'Contact the vendor or check official advisories for patches or workarounds addressing the hard-coded RC4 key issue.'}] [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart