No analysis available yet.
Vendor Solution
The vulnerability has been fixed by Arteche in firmware version 2.2.1.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-8624 | Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser. |
Wed, 15 Oct 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arteche
Arteche satech Bcu Arteche satech Bcu Firmware |
|
| CPEs | cpe:2.3:h:arteche:satech_bcu:-:*:*:*:*:*:*:* cpe:2.3:o:arteche:satech_bcu_firmware:2.1.3:*:*:*:*:*:*:* |
|
| Vendors & Products |
Arteche
Arteche satech Bcu Arteche satech Bcu Firmware |
|
| Metrics |
cvssV3_1
|
Fri, 28 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 28 Mar 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Privilege escalation vulnerability in the saTECH BCU firmware version 2.1.3. An attacker with access to the CLI of the device could make use of the nice command to bypass all restrictions and elevate privileges as a superuser. | |
| Title | Privilege escalation vulnerability in saTECH BCU | |
| Weaknesses | CWE-269 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2025-03-28T13:38:38.910Z
Reserved: 2025-03-27T10:59:40.368Z
Link: CVE-2025-2858
Updated: 2025-03-28T13:38:35.848Z
Status : Analyzed
Published: 2025-03-28T14:15:20.650
Modified: 2025-10-15T16:52:22.527
Link: CVE-2025-2858
No data.
OpenCVE Enrichment
No data.
EUVD