CVE-2025-2858

8.8 HIGH

📋 TL;DR

This privilege escalation vulnerability in saTECH BCU firmware allows attackers with CLI access to bypass restrictions and gain superuser privileges using the 'nice' command. It affects organizations using saTECH BCU devices with firmware version 2.1.3. Attackers need initial access to the device's command-line interface to exploit this vulnerability.

💻 Affected Systems

Products:
  • saTECH BCU
Versions: 2.1.3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running the vulnerable firmware version are affected. The vulnerability exists in the default configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to install persistent backdoors, modify configurations, access sensitive data, and use the device as a pivot point to attack other network systems.

🟠

Likely Case

Attacker with initial CLI access elevates to root privileges, gains full control of the device, and can manipulate building control systems or extract credentials.

🟢

If Mitigated

Limited impact if proper network segmentation, access controls, and monitoring prevent initial CLI access and detect privilege escalation attempts.

🌐 Internet-Facing: MEDIUM - While the exploit requires CLI access, internet-facing devices could be targeted if other vulnerabilities provide initial access.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts with CLI access can easily exploit this to gain full device control.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires CLI access first. The 'nice' command misuse is the exploitation vector. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu

Restart Required: No

Instructions:

1. Contact saTECH/Arteche for patched firmware version. 2. Backup device configuration. 3. Apply firmware update following vendor instructions. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit command-line interface access to authorized administrators only using network controls and authentication.

Monitor 'nice' Command Usage

all

Implement logging and alerting for any use of the 'nice' command on affected devices.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate BCU devices from untrusted networks
  • Enforce least privilege access controls and monitor all CLI access attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version via device management interface or CLI. If version is 2.1.3, the device is vulnerable.

Check Version:

Check device documentation for version command, typically via web interface or CLI management commands

Verify Fix Applied:

After patching, verify firmware version is updated to a version later than 2.1.3 and test that 'nice' command no longer allows privilege escalation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual 'nice' command executions
  • Multiple failed then successful authentication attempts
  • Privilege escalation attempts in system logs

Network Indicators:

  • Unexpected SSH or CLI connections to BCU devices
  • Anomalous network traffic from BCU devices

SIEM Query:

source="bcu_logs" AND (command="nice" OR "privilege escalation" OR "root access")

🔗 References

📤 Share & Export