- What is the severity of CVE-2023-0053?
- CVE-2023-0053 has been scored as a high severity vulnerability.
- How to fix CVE-2023-0053?
- As a workaround for remediating CVE-2023-0053: SAUTER Controls has stated that this product line is no longer supported, as it was discontinued in 2016. SAUTER Controls recommends users take all necessary measures to protect the integrity of building automation network access, using all appropriate means and policies to minimize risks. Sauter Controls recommends users evaluate and upgrade legacy systems to current solutions where necessary. Affected users should contact SAUTER Controls https://www.sauter-controls.com/ for instructions on upgrading legacy systems.
- Is CVE-2023-0053 being actively exploited in the wild?
- As for now, there are no information to confirm that CVE-2023-0053 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
- What software or system is affected by CVE-2023-0053?
- CVE-2023-0053 affects SAUTER Controls Nova 220 (EYK220F001) DDC with BACnet connection, SAUTER Controls Nova 230 (EYK230F001) DDC with BACnet connection, SAUTER Controls Nova 106 (EYK300F001) BACnet communication card, SAUTER Controls moduNet300 (EY-AM300F001, EY-AM300F002).