CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C
Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.
AI Analysis
Technical Summary
CVE-2023-7328 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Screen SFT DAB 600/C device firmware versions up to and including 1.9.3 from DB Elettronica Telecomunicazioni SpA. The flaw lies in the user management API, which lacks proper access control mechanisms, allowing unauthenticated remote attackers to query the API and retrieve structured user data. This data includes account names and connection metadata such as client IP addresses and session timeout values. The vulnerability is remotely exploitable without any authentication or user interaction, and the attack vector is network-based with low attack complexity. The CVSS v4.0 base score is 6.9, indicating a medium severity level primarily due to the confidentiality impact. The vulnerability does not affect integrity or availability directly but exposes sensitive information that could be leveraged for reconnaissance or subsequent attacks. No patches or exploits are currently publicly available, but the absence of authentication on a critical management function represents a significant security oversight. The device is typically used in telecommunications infrastructure, where user management data confidentiality is important for operational security and privacy compliance.
Potential Impact
For European organizations, especially those operating telecom infrastructure or industrial control systems using the Screen SFT DAB 600/C, this vulnerability poses a risk to confidentiality. Exposure of user account names and connection metadata could enable attackers to map network topology, identify privileged accounts, or perform targeted social engineering or brute force attacks. This could lead to unauthorized access or disruption in the future. Although the vulnerability does not directly impact system integrity or availability, the leaked information could be a stepping stone for more severe attacks. Organizations in regulated sectors must consider privacy implications under GDPR, as client IP addresses and user data exposure may constitute personal data leakage. The risk is heightened in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and no required authentication.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the user management API by applying firewall rules or network segmentation to limit access only to trusted management hosts. Employ VPNs or secure tunnels for remote management to prevent unauthorized external access. Monitor network traffic for unusual API requests or reconnaissance activity targeting the device. Conduct thorough inventory and asset management to identify all affected devices and prioritize their protection. Engage with the vendor for firmware updates or security advisories and apply patches promptly once released. Additionally, review and harden device configurations to disable unnecessary services or APIs if possible. Implement strong authentication and authorization mechanisms on management interfaces when supported. Finally, incorporate this vulnerability into incident response and threat hunting exercises to detect potential exploitation attempts.
Affected Countries
Italy, Germany, France, Spain, United Kingdom, Netherlands
CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C
Description
Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.
AI-Powered Analysis
Technical Analysis
CVE-2023-7328 is a vulnerability classified under CWE-306 (Missing Authentication for Critical Function) affecting the Screen SFT DAB 600/C device firmware versions up to and including 1.9.3 from DB Elettronica Telecomunicazioni SpA. The flaw lies in the user management API, which lacks proper access control mechanisms, allowing unauthenticated remote attackers to query the API and retrieve structured user data. This data includes account names and connection metadata such as client IP addresses and session timeout values. The vulnerability is remotely exploitable without any authentication or user interaction, and the attack vector is network-based with low attack complexity. The CVSS v4.0 base score is 6.9, indicating a medium severity level primarily due to the confidentiality impact. The vulnerability does not affect integrity or availability directly but exposes sensitive information that could be leveraged for reconnaissance or subsequent attacks. No patches or exploits are currently publicly available, but the absence of authentication on a critical management function represents a significant security oversight. The device is typically used in telecommunications infrastructure, where user management data confidentiality is important for operational security and privacy compliance.
Potential Impact
For European organizations, especially those operating telecom infrastructure or industrial control systems using the Screen SFT DAB 600/C, this vulnerability poses a risk to confidentiality. Exposure of user account names and connection metadata could enable attackers to map network topology, identify privileged accounts, or perform targeted social engineering or brute force attacks. This could lead to unauthorized access or disruption in the future. Although the vulnerability does not directly impact system integrity or availability, the leaked information could be a stepping stone for more severe attacks. Organizations in regulated sectors must consider privacy implications under GDPR, as client IP addresses and user data exposure may constitute personal data leakage. The risk is heightened in environments where these devices are accessible from untrusted networks or insufficiently segmented internal networks. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially given the ease of exploitation and no required authentication.
Mitigation Recommendations
Since no official patches are currently available, European organizations should implement compensating controls immediately. These include restricting network access to the user management API by applying firewall rules or network segmentation to limit access only to trusted management hosts. Employ VPNs or secure tunnels for remote management to prevent unauthorized external access. Monitor network traffic for unusual API requests or reconnaissance activity targeting the device. Conduct thorough inventory and asset management to identify all affected devices and prioritize their protection. Engage with the vendor for firmware updates or security advisories and apply patches promptly once released. Additionally, review and harden device configurations to disable unnecessary services or APIs if possible. Implement strong authentication and authorization mechanisms on management interfaces when supported. Finally, incorporate this vulnerability into incident response and threat hunting exercises to detect potential exploitation attempts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-11-12T20:20:51.734Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6917b3f1290dbf2fa84d9aad
Added to database: 11/14/2025, 10:57:53 PM
Last enriched: 11/14/2025, 11:12:44 PM
Last updated: 11/17/2025, 8:09:28 AM
Views: 14
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-65073: n/a
UnknownCVE-2025-13269: SQL Injection in Campcodes School Fees Payment Management System
MediumCVE-2025-13268: Injection in Dromara dataCompare
MediumCVE-2025-13267: SQL Injection in SourceCodester Dental Clinic Appointment Reservation System
MediumCVE-2025-13165: CWE-770 Allocation of Resources Without Limits or Throttling in Digiwin EasyFlow GP
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.