SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
10 Oct 2025, 16:39
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Arteche satech Bcu
Arteche satech Bcu Firmware Arteche |
|
| CPE | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* |
|
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu - Third Party Advisory | |
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
28 Mar 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-28 14:15
Updated : 2025-10-10 16:39
NVD link : CVE-2025-2861
Mitre link : CVE-2025-2861
CVE.ORG link : CVE-2025-2861
JSON object : View
Products Affected
arteche
- satech_bcu_firmware
- satech_bcu
CWE
CWE-319
Cleartext Transmission of Sensitive Information
