Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C

0
Medium
VulnerabilityCVE-2023-7328cvecve-2023-7328cwe-306
Published: Fri Nov 14 2025 (11/14/2025, 22:51:05 UTC)
Source: CVE Database V5
Vendor/Project: DB Elettronica Telecomunicazioni SpA
Product: Screen SFT DAB 600/C

Description

Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.

AI-Powered Analysis

AILast updated: 11/14/2025, 23:12:44 UTC

Technical Analysis

CVE-2023-7328 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Screen SFT DAB 600/C device firmware versions up to and including 1.9.3 from DB Elettronica Telecomunicazioni SpA. The flaw lies in the user management API, which lacks proper access control mechanisms, allowing unauthenticated remote attackers to query the API and retrieve structured user data. This data includes account names and connection metadata such as client IP addresses and session timeout values. The vulnerability is remotely exploitable without any authentication or user interaction, and the attack vector is network-based with low attack complexity. The CVSS v4.0 base score is 6.9, indicating a medium severity level primarily due to the confidentiality impact. The vulnerability does not affect integrity or availability directly but exposes sensitive information that could be leveraged for reconnaissance or subsequent attacks. No patches or exploits are currently publicly available, but the absence of authentication on a critical management function represents a significant security oversight. The device is typically used in telecommunications infrastructure, where user management data confidentiality is important for operational security and privacy compliance.

Potential Impact

For European organizations, especially those operating telecom infrastructure or industrial control systems using the Screen SFT DAB 600/C, this vulnerability poses a risk to confidentiality. Exposure of user account names and connection metadata could enable attackers to map network topology, identify privileged accounts, or perform targeted social engineering or brute force attacks. This could lead to unauthorized access or disruption in the future. Although the vulnerability does not directly impact system integrity or availability, the leaked information could be a stepping stone for more severe attacks. Organizations in regulated sectors must consider privacy implications under GDPR, as client IP addresses and user data exposure may constitute personal data leakage. The risk is heightened in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and no required authentication.

Mitigation Recommendations

Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the user management API by applying firewall rules or network segmentation to limit access only to trusted management hosts. Employ VPNs or secure tunnels for remote management to prevent unauthorized external access. Monitor network traffic for unusual API requests or reconnaissance activity targeting the device. Conduct thorough inventory and asset management to identify all affected devices and prioritize their protection. Engage with the vendor for firmware updates or security advisories and apply patches promptly once released. Additionally, review and harden device configurations to disable unnecessary services or APIs if possible. Implement strong authentication and authorization mechanisms on management interfaces when supported. Finally, incorporate this vulnerability into incident response and threat hunting exercises to detect potential exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-11-12T20:20:51.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6917b3f1290dbf2fa84d9aad

Added to database: 11/14/2025, 10:57:53 PM

Last enriched: 11/14/2025, 11:12:44 PM

Last updated: 11/17/2025, 8:09:28 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats