Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools

STER

Source -

CNA

CNA CVEs -

3

ADP CVEs -

0

CISA CVEs -

0

NVD CVEs -

0
Related CVEsRelated VendorsRelated AssignersReports
3Vulnerabilities found

CVE-2026-25608
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-2.3||LOW
EPSS-0.04% / 13.28%
||
7 Day CHG~0.00%
Published-22 May, 2026 | 09:14
Updated-22 May, 2026 | 10:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Lack of traffic encryption in STER

STER uses unencrypted TCP traffic to transmit data over the network. It allows an attacker to conduct a Man-In-The-Middle attack and obtain sensitive data such as passwords, personal data, or authentication tokens. This issue was fixed in version 9.5.

Action-Not Available
Vendor-Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product-STER
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2026-25607
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-5.7||MEDIUM
EPSS-0.01% / 2.29%
||
7 Day CHG~0.00%
Published-22 May, 2026 | 09:14
Updated-22 May, 2026 | 13:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak password encoding in STER

Use of a weak password encoding algorithm in STER software allows the value of the password to be guessed after analyzing how passwords with known values are encoded. This issue was fixed in version 9.5.

Action-Not Available
Vendor-Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product-STER
CWE ID-CWE-261
Weak Encoding for Password
CVE-2026-25606
Assigner-CERT.PL
ShareView Details
Assigner-CERT.PL
CVSS Score-8.7||HIGH
EPSS-0.03% / 8.96%
||
7 Day CHG~0.00%
Published-22 May, 2026 | 09:14
Updated-22 May, 2026 | 13:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
SQL Injection in STER

A SQL injection vulnerability has been identified in STER. Improper neutralization of input provided by user into multiple Search Filters allows for SQL Injection attacks. It allows an authenticated attacker to view sensitive data such as data belonging to other users, or any other data that the application itself is able to access This issue was fixed in version 9.5.

Action-Not Available
Vendor-Centralny Instytut Ochrony Pracy - Państwowy Instytut Badawczy
Product-STER
CWE ID-CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')