CVE-2023-0053
Published Mar 2, 2023
Last updated a year ago
Overview
- Description
- SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior have only FTP and Telnet available for device management. Any sensitive information communicated through these protocols, such as credentials, is sent in cleartext. An attacker could obtain sensitive information such as user credentials to gain access to the system.
- Source
- ics-cert@hq.dhs.gov
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sauter-controls:nova_220_eyk220f001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "72F35195-7225-426C-998F-9E68AE7823F8" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sauter-controls:nova_220_eyk220f001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E514737-2011-43D1-8283-58D57BA13BE5", "versionEndIncluding": "3.3-006" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sauter-controls:nova_230_eyk230f001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "11465A2B-145D-47A5-9275-C4853304488C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sauter-controls:nova_230_eyk230f001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CBBF6A0-9764-47E0-81DC-04AEEED9AC18", "versionEndIncluding": "3.3-006" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sauter-controls:nova_106_eyk300f001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D125C85-B22C-4A2F-A304-988C606259BC", "versionEndIncluding": "3.3-006" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sauter-controls:nova_106_eyk300f001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "668A40CB-2C90-426B-B0B3-709C6601104D" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sauter-controls:modunet300_ey-am300f001_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8668DBA6-866D-43DE-97F6-C7D91E1FD308", "versionEndIncluding": "3.3-006" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sauter-controls:modunet300_ey-am300f001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7214F356-6035-4A3B-8519-F6D89FF00370" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:sauter-controls:modunet300_ey-am300f002_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A38DFF4-32E2-4B7C-A93D-8ADE3A862FDD", "versionEndIncluding": "3.3-006" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:sauter-controls:modunet300_ey-am300f002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0D8B577B-9BEB-4DE3-A2A4-648EAF1C15CB" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sauter-controls:bacnetstac:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10FFD021-861D-40B7-B545-8F2F6BA70B67", "versionEndIncluding": "4.2.1" } ], "operator": "OR" } ] } ]