{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-0053","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2023-01-04T16:24:06.705Z","datePublished":"2023-03-02T00:15:49.817Z","dateUpdated":"2025-01-16T21:55:31.611Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Nova 220 (EYK220F001) DDC with BACnet connection","vendor":"SAUTER Controls","versions":[{"lessThanOrEqual":"3.3-006","status":"affected","version":"Firmware all versions","versionType":"custom"},{"lessThanOrEqual":"4.2.1","status":"affected","version":"BACnetstac all versions","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Nova 230 (EYK230F001) DDC with BACnet connection","vendor":"SAUTER Controls","versions":[{"lessThanOrEqual":"3.3-006","status":"affected","version":"Firmware all versions","versionType":"custom"},{"lessThanOrEqual":"4.2.1","status":"affected","version":"BACnetstac all versions","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"Nova 106 (EYK300F001) BACnet communication card","vendor":"SAUTER Controls","versions":[{"lessThanOrEqual":"3.3-006","status":"affected","version":"Firmware all versions","versionType":"custom"},{"lessThanOrEqual":"4.2.1","status":"affected","version":"BACnetstac all versions","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"moduNet300 (EY-AM300F001, EY-AM300F002)","vendor":"SAUTER Controls","versions":[{"lessThanOrEqual":"3.3-006","status":"affected","version":"Firmware all versions","versionType":"custom"},{"lessThanOrEqual":"4.2.1","status":"affected","version":"BACnetstac all versions","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Jairo Alonso Ortiz, Aarón Flecha Menéndez and Iñaki Lázaro Ayanz of S21Sec"}],"datePublic":"2023-01-12T18:15:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\nSAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and \nprior and BACnetstac version 4.2.1 and prior have only FTP and Telnet \navailable for device management. Any sensitive information communicated \nthrough these protocols, such as credentials, is sent in cleartext. An \nattacker could obtain sensitive information such as user credentials to \ngain access to the system. \n\n</p>"}],"value":"SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and \nprior and BACnetstac version 4.2.1 and prior have only FTP and Telnet \navailable for device management. Any sensitive information communicated \nthrough these protocols, such as credentials, is sent in cleartext. An \nattacker could obtain sensitive information such as user credentials to \ngain access to the system. \n\n\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-319","description":"CWE-319 Cleartext Transmission of Sensitive Information","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2023-10-26T23:18:13.533Z"},"references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-05"}],"source":{"discovery":"EXTERNAL"},"title":"SAUTER Controls Nova 200–220 Series Cleartext Transmission of Sensitive Information","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"\n<p>SAUTER Controls has stated that this product line is no longer \nsupported, as it was discontinued in 2016. SAUTER Controls recommends \nusers take all necessary measures to protect the integrity of building \nautomation network access, using all appropriate means and policies to \nminimize risks. Sauter Controls recommends users evaluate and upgrade \nlegacy systems to current solutions where necessary. &nbsp;</p>\n<p>Affected users should contact <a target=\"_blank\" rel=\"nofollow\" href=\"https://www.sauter-controls.com/\">SAUTER Controls</a>&nbsp;<span style=\"background-color: var(--wht);\">for instructions on upgrading legacy systems.</span></p>"}],"value":"SAUTER Controls has stated that this product line is no longer \nsupported, as it was discontinued in 2016. SAUTER Controls recommends \nusers take all necessary measures to protect the integrity of building \nautomation network access, using all appropriate means and policies to \nminimize risks. Sauter Controls recommends users evaluate and upgrade \nlegacy systems to current solutions where necessary.  \n\n\nAffected users should contact  SAUTER Controls https://www.sauter-controls.com/  for instructions on upgrading legacy systems.\n\n"}],"x_generator":{"engine":"VINCE 2.0.5","env":"prod","origin":"https://cveawg.mitre.org/api/cve/CVE-2023-0052"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T04:54:32.601Z"},"title":"CVE Program Container","references":[{"url":"https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-05","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-16T20:56:33.933472Z","id":"CVE-2023-0053","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-16T21:55:31.611Z"}}]}}