Browse all 3 CVE security advisories affecting SAUTER Controls. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SAUTER Controls specializes in building automation and energy management systems for commercial buildings. Historically, their products have been vulnerable to remote code execution, cross-site scripting, and privilege escalation vulnerabilities, often stemming from insufficient input validation and weak authentication mechanisms. The company has three CVEs on record, with issues including hardcoded credentials and insecure default configurations. While no major public security incidents have been documented, their systems' critical infrastructure role makes them potential targets for attackers seeking building control access. Security researchers have noted that legacy products may lack regular updates, leaving exposed systems vulnerable to exploitation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-0053 | SAUTER Controls Nova 200–220 Series Cleartext Transmission of Sensitive Information — Nova 220 (EYK220F001) DDC with BACnet connectionCWE-319 | 7.5 | High | 2023-03-02 |
| CVE-2023-0052 | SAUTER Controls Nova 200–220 Series Missing Authentication for Critical Function — Nova 220 (EYK220F001) DDC with BACnet connectionCWE-306 | 9.8 | Critical | 2023-01-20 |
| CVE-2022-40190 | SAUTER Controls moduWeb 跨站脚本漏洞 — moduWebCWE-79 | 8.8 | High | 2022-10-31 |
This page lists every published CVE security advisory associated with SAUTER Controls. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.