Impact
The STER application transmits data over unencrypted TCP, creating a vulnerability defined as cleartext transmission of sensitive information (CWE-319). An attacker can intercept the traffic to capture passwords, personal data, or authentication tokens, thereby compromising confidentiality of the data exchanged with STER.
Affected Systems
Centralny Instytut Ochrony Pracy – Państwowy Instytut Badawczy’s STER product is affected. Versions prior to 9.5 lack encryption; the issue was resolved in the 9.5 release.
Risk and Exploitability
The CVSS score of 2.3 indicates a low severity for this flaw, and the EPSS score is not available. It is not listed in the CISA KEV catalog. The vulnerability can be exploited via a network‑level Man‑In‑The‑Middle attack when unencrypted traffic is observed, making it a straightforward exploit for anyone with network access to STER endpoints.
OpenCVE Enrichment