CVE-2026-27755:
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability allowing attackers to forge authenticated sessions.
Score
A numerical rating that indicates how dangerous this vulnerability is.
9.8Critical- Published Date:Feb 27, 2026
- CISA KEV Date:*No Data*
- Industries Affected:20
Threat Predictions
- EPSS Score:0.1
- EPSS Percentile:35%
Exploitability
- Score:3.9
- Attack Vector:NETWORK
- Attack Complexity:LOW
- Privileges Required:NONE
- User Interaction:NONE
- Scope:UNCHANGED
Impact
- Score:5.9
- Confidentiality Impact:HIGH
- Integrity Impact:HIGH
- Availability Impact:HIGH
Description Preview
SODOLA SL902-SWTGW124AS firmware versions through 200.1.20 contain a weak session identifier generation vulnerability allowing attackers to forge authenticated sessions.
Overview
The vulnerability in SODOLA SL902-SWTGW124AS firmware presents a severe security risk. With a CVSS v3.1 base score of 9.8 (Critical), it allows network-based attacks with low complexity and requires no privileges or user interaction. The impact is high across confidentiality, integrity, and availability. The weakness is classified as CWE-330, indicating the use of insufficiently random values. This flaw enables attackers to predict session identifiers, bypassing authentication and gaining unauthorized access to the device. The ease of exploitation and the potential for complete system compromise make this vulnerability particularly dangerous for affected networks.
Remediation
- As of the vulnerability disclosure, no specific remediation steps have been provided by the vendor. However, general best practices for addressing such vulnerabilities include:
- 1. Update the firmware to a patched version when available.
- 2. Implement strong, unpredictable session identifier generation methods.
- 3. Use additional authentication factors to enhance security.
- 4. Limit network access to the device management interface.
- 5. Monitor for suspicious login attempts or unusual access patterns.
- 6. Consider replacing affected devices if a patch is not forthcoming.
- Users should regularly check the SODOLA website for security updates and apply them promptly when available.
References
- [1] SODOLA. "SODOLA 6-Port 2.5G Easy Web Managed Switch." SODOLA Network. https://www.sodola-network.com/products/sodola-6-port-2-5g-easy-web-managed-switch-4-x-2-5g-base-t-ports-2-x-10g-sfp-static-aggregation-qos-vlan-igmp-2-5gb-network-home-lab-switch
- [2] VulnCheck. "SODOLA SL902-SWTGW124AS Predictable Session ID." VulnCheck Advisories. https://www.vulncheck.com/advisories/sodola-sl902-swtgw124as-predictable-session-id
Industries Affected
Below is a list of industries most commonly impacted or potentially at risk based on intelligence.