Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu | Third Party Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
 
 | 
History
                    15 Oct 2025, 16:52
| Type | Values Removed | Values Added | 
|---|---|---|
| CVSS | v2 : v3 : | v2 : unknown v3 : 8.8 | 
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu - Third Party Advisory | |
| CPE | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* | |
| First Time | Arteche satech Bcu Arteche satech Bcu Firmware Arteche | |
| Summary | 
 | 
28 Mar 2025, 14:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2025-03-28 14:15
Updated : 2025-10-15 16:52
NVD link : CVE-2025-2858
Mitre link : CVE-2025-2858
CVE.ORG link : CVE-2025-2858
JSON object : View
Products Affected
                arteche
- satech_bcu_firmware
- satech_bcu
CWE
                
                    
                        
                        CWE-269
                        
            Improper Privilege Management
