SaTECH BCU, in its firmware version 2.1.3, performs weak password encryption. This allows an attacker with access to the device's system or website to obtain the credentials, as the storage methods used are not strong enough in terms of encryption.
References
| Link | Resource |
|---|---|
| https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu | Third Party Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
15 Oct 2025, 16:50
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu - Third Party Advisory | |
| First Time |
Arteche satech Bcu
Arteche satech Bcu Firmware Arteche |
|
| Summary |
|
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| CPE | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* |
28 Mar 2025, 14:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-03-28 14:15
Updated : 2025-10-15 16:50
NVD link : CVE-2025-2862
Mitre link : CVE-2025-2862
CVE.ORG link : CVE-2025-2862
JSON object : View
Products Affected
arteche
- satech_bcu_firmware
- satech_bcu
CWE
CWE-261
Weak Encoding for Password
