SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.
History

Thu, 03 Apr 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 13:30:00 +0000

Type Values Removed Values Added
Description SaTECH BCU in its firmware version 2.1.3 uses the HTTP protocol. The use of the HTTP protocol for web browsing has the problem that information is exchanged in unencrypted text. Since sensitive data such as credentials are exchanged, an attacker could obtain them and log in legitimately.
Title Cleartext Transmission of Sensitive Information vulnerability in saTECH BCU
Weaknesses CWE-319
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published: 2025-03-28T13:11:29.282Z

Updated: 2025-04-03T12:58:35.556Z

Reserved: 2025-03-27T10:59:42.618Z

Link: CVE-2025-2861

cve-icon Vulnrichment

Updated: 2025-03-28T13:35:11.445Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-28T14:15:21.113

Modified: 2025-03-28T18:11:40.180

Link: CVE-2025-2861

cve-icon Redhat

No data.