SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and
prior and BACnetstac version 4.2.1 and prior have only FTP and Telnet
available for device management. Any sensitive information communicated
through these protocols, such as credentials, is sent in cleartext. An
attacker could obtain sensitive information such as user credentials to
gain access to the system.



Advisories
Source ID Title
EUVD EUVD EUVD-2023-12156 SAUTER Controls Nova 200–220 Series with firmware version 3.3-006 and prior and BACnetstac version 4.2.1 and prior have only FTP and Telnet available for device management. Any sensitive information communicated through these protocols, such as credentials, is sent in cleartext. An attacker could obtain sensitive information such as user credentials to gain access to the system.
Fixes

Solution

No solution given by the vendor.


Workaround

SAUTER Controls has stated that this product line is no longer supported, as it was discontinued in 2016. SAUTER Controls recommends users take all necessary measures to protect the integrity of building automation network access, using all appropriate means and policies to minimize risks. Sauter Controls recommends users evaluate and upgrade legacy systems to current solutions where necessary.   Affected users should contact SAUTER Controls https://www.sauter-controls.com/  for instructions on upgrading legacy systems.

History

Thu, 16 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-01-16T21:55:31.611Z

Reserved: 2023-01-04T16:24:06.705Z

Link: CVE-2023-0053

cve-icon Vulnrichment

Updated: 2024-08-02T04:54:32.601Z

cve-icon NVD

Status : Modified

Published: 2023-03-02T01:15:11.590

Modified: 2024-11-21T07:36:28.010

Link: CVE-2023-0053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.