CVE-2023-0053

7.5 HIGH

📋 TL;DR

This vulnerability affects SAUTER Controls Nova 200-220 Series building automation controllers and BACnetstac software, allowing attackers to intercept sensitive information like credentials transmitted in cleartext via FTP and Telnet protocols. Organizations using these devices with vulnerable firmware/software versions are at risk of credential theft and unauthorized system access.

💻 Affected Systems

Products:
  • SAUTER Controls Nova 200 Series
  • SAUTER Controls Nova 220 Series
  • BACnetstac
Versions: Nova firmware 3.3-006 and prior, BACnetstac 4.2.1 and prior
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Devices using only FTP and Telnet for management are vulnerable; other management interfaces may also be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to building automation systems, potentially manipulating HVAC, lighting, or security controls, causing physical damage, safety hazards, or operational disruption.

🟠

Likely Case

Attackers steal credentials to access the management interface, potentially modifying device configurations, disrupting building operations, or using the device as a foothold for lateral movement.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to potential credential exposure without successful exploitation of the management interface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires network access to intercept cleartext traffic; no authentication bypass needed if credentials are captured.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Nova firmware >3.3-006, BACnetstac >4.2.1

Vendor Advisory: https://www.cisa.gov/uscert/ics/advisories/icsa-23-012-05

Restart Required: Yes

Instructions:

1. Contact SAUTER Controls for updated firmware/software. 2. Backup device configurations. 3. Apply updates following vendor instructions. 4. Verify secure protocols are enabled post-update.

🔧 Temporary Workarounds

Disable FTP and Telnet

all

Disable vulnerable protocols and use secure alternatives like SFTP/SSH if available

Consult device documentation for protocol disable commands

Network Segmentation

all

Isolate affected devices on separate VLANs with strict access controls

🧯 If You Can't Patch

  • Implement network encryption (VPN/IPsec) for all management traffic to these devices
  • Deploy network monitoring to detect credential interception attempts and unauthorized access

🔍 How to Verify

Check if Vulnerable:

Check device firmware version via web interface or serial console; verify if FTP/Telnet are the only management protocols enabled

Check Version:

Consult device documentation for version check commands (varies by model)

Verify Fix Applied:

Confirm firmware version is >3.3-006 for Nova or >4.2.1 for BACnetstac; verify secure protocols (SSH/SFTP) are available and cleartext protocols are disabled

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from unexpected IPs
  • Multiple Telnet/FTP connection attempts
  • Configuration changes from unknown users

Network Indicators:

  • Cleartext credential transmission on port 21 (FTP) or 23 (Telnet)
  • Unusual outbound connections from affected devices

SIEM Query:

source_port:21 OR source_port:23 AND (event_type:"authentication" OR protocol:"ftp" OR protocol:"telnet")

🔗 References

📤 Share & Export