CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C
Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.
AI Analysis
Technical Summary
CVE-2023-7328 identifies a missing authentication vulnerability (CWE-306) in the Screen SFT DAB 600/C device firmware versions up to 1.9.3, produced by DB Elettronica Telecomunicazioni SpA. The flaw resides in the user management API, which improperly permits unauthenticated requests to access structured user data. This data includes account names and connection metadata such as client IP addresses and session timeout values. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The CVSS score of 6.9 (medium severity) reflects the moderate impact on confidentiality due to information disclosure, with no direct impact on integrity or availability. Although no patches or exploits are currently documented, the exposure of user account details and network metadata can aid attackers in reconnaissance, potentially leading to more sophisticated attacks like credential stuffing, lateral movement, or targeted intrusions. The device is commonly used in telecommunications environments, where protecting user credentials and network metadata is critical. The lack of authentication on a critical function represents a significant security design flaw that must be addressed to prevent unauthorized data leakage.
Potential Impact
For European organizations, especially those in telecommunications or critical infrastructure sectors using the Screen SFT DAB 600/C device, this vulnerability poses a risk of sensitive information disclosure. Exposure of user account names and connection metadata can facilitate targeted attacks such as social engineering, credential harvesting, or network reconnaissance. This can lead to further compromise of networked systems or unauthorized access. Although the vulnerability does not directly allow system control or denial of service, the leaked information can be leveraged by attackers to escalate privileges or move laterally within networks. The impact is heightened in environments where these devices manage critical communications or sensitive user data. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal and network data, so exploitation could result in compliance violations and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, making timely mitigation essential.
Mitigation Recommendations
1. Monitor vendor communications closely for firmware updates or patches addressing CVE-2023-7328 and apply them promptly once available. 2. Restrict network access to the user management API by implementing strict firewall rules or access control lists (ACLs) to limit exposure to trusted management networks only. 3. Employ network segmentation to isolate the affected devices from general user or internet-facing networks, reducing the attack surface. 4. Enable and review detailed logging and monitoring on the devices and network perimeter to detect unauthorized access attempts to management interfaces. 5. Conduct regular security assessments and penetration tests focusing on device management interfaces to identify similar weaknesses. 6. Where possible, implement additional authentication or VPN access controls to protect management APIs. 7. Educate network administrators and security teams about the vulnerability and the importance of securing device management channels. 8. Consider compensating controls such as intrusion detection systems (IDS) tuned to detect anomalous API access patterns. These steps go beyond generic advice by focusing on network-level protections and proactive monitoring tailored to the specific device and vulnerability context.
Affected Countries
Italy, Germany, France, United Kingdom, Spain, Netherlands
CVE-2023-7328: CWE-306 Missing Authentication for Critical Function in DB Elettronica Telecomunicazioni SpA Screen SFT DAB 600/C
Description
Screen SFT DAB 600/C firmware versions up to and including 1.9.3 contain an improper access control on the user management API allows unauthenticated requests to retrieve structured user data, including account names and connection metadata such as client IP and timeout values.
AI-Powered Analysis
Technical Analysis
CVE-2023-7328 identifies a missing authentication vulnerability (CWE-306) in the Screen SFT DAB 600/C device firmware versions up to 1.9.3, produced by DB Elettronica Telecomunicazioni SpA. The flaw resides in the user management API, which improperly permits unauthenticated requests to access structured user data. This data includes account names and connection metadata such as client IP addresses and session timeout values. The vulnerability is remotely exploitable without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/AT:N/UI:N/PR:N). The CVSS score of 6.9 (medium severity) reflects the moderate impact on confidentiality due to information disclosure, with no direct impact on integrity or availability. Although no patches or exploits are currently documented, the exposure of user account details and network metadata can aid attackers in reconnaissance, potentially leading to more sophisticated attacks like credential stuffing, lateral movement, or targeted intrusions. The device is commonly used in telecommunications environments, where protecting user credentials and network metadata is critical. The lack of authentication on a critical function represents a significant security design flaw that must be addressed to prevent unauthorized data leakage.
Potential Impact
For European organizations, especially those in telecommunications or critical infrastructure sectors using the Screen SFT DAB 600/C device, this vulnerability poses a risk of sensitive information disclosure. Exposure of user account names and connection metadata can facilitate targeted attacks such as social engineering, credential harvesting, or network reconnaissance. This can lead to further compromise of networked systems or unauthorized access. Although the vulnerability does not directly allow system control or denial of service, the leaked information can be leveraged by attackers to escalate privileges or move laterally within networks. The impact is heightened in environments where these devices manage critical communications or sensitive user data. Additionally, regulatory frameworks such as GDPR impose strict requirements on protecting personal and network data, so exploitation could result in compliance violations and reputational damage. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks, making timely mitigation essential.
Mitigation Recommendations
1. Monitor vendor communications closely for firmware updates or patches addressing CVE-2023-7328 and apply them promptly once available. 2. Restrict network access to the user management API by implementing strict firewall rules or access control lists (ACLs) to limit exposure to trusted management networks only. 3. Employ network segmentation to isolate the affected devices from general user or internet-facing networks, reducing the attack surface. 4. Enable and review detailed logging and monitoring on the devices and network perimeter to detect unauthorized access attempts to management interfaces. 5. Conduct regular security assessments and penetration tests focusing on device management interfaces to identify similar weaknesses. 6. Where possible, implement additional authentication or VPN access controls to protect management APIs. 7. Educate network administrators and security teams about the vulnerability and the importance of securing device management channels. 8. Consider compensating controls such as intrusion detection systems (IDS) tuned to detect anomalous API access patterns. These steps go beyond generic advice by focusing on network-level protections and proactive monitoring tailored to the specific device and vulnerability context.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-11-12T20:20:51.734Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6917b3f1290dbf2fa84d9aad
Added to database: 11/14/2025, 10:57:53 PM
Last enriched: 11/21/2025, 11:39:11 PM
Last updated: 1/7/2026, 4:17:44 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20893: Origin validation error in Fujitsu Client Computing Limited Fujitsu Security Solution AuthConductor Client Basic V2
HighCVE-2025-14891: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-14059: CWE-73 External Control of File Name or Path in roxnor EmailKit – Email Customizer for WooCommerce & WP
MediumCVE-2025-12648: CWE-552 Files or Directories Accessible to External Parties in cbutlerjr WP-Members Membership Plugin
MediumCVE-2025-14631: CWE-476 NULL Pointer Dereference in TP-Link Systems Inc. Archer BE400
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.