SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Oct 2025, 16:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu - Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
|
CPE | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* |
|
First Time |
Arteche satech Bcu Firmware
Arteche Arteche satech Bcu |
28 Mar 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-28 14:15
Updated : 2025-10-10 16:39
NVD link : CVE-2025-2861
Mitre link : CVE-2025-2861
CVE.ORG link : CVE-2025-2861
JSON object : View
Products Affected
arteche
- satech_bcu
- satech_bcu_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information