SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
15 Oct 2025, 16:50
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Arteche satech Bcu Firmware
Arteche Arteche satech Bcu |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu - Third Party Advisory | |
| CPE | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* |
|
| Summary |
|
28 Mar 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-28 14:15
Updated : 2025-10-15 16:50
NVD link : CVE-2025-2862
Mitre link : CVE-2025-2862
CVE.ORG link : CVE-2025-2862
JSON object : View
Products Affected
arteche
- satech_bcu
- satech_bcu_firmware
CWE
CWE-261
Weak Encoding for Password
