CVE-2025-2863

7.8 HIGH

📋 TL;DR

A CSRF vulnerability in saTECH BCU firmware version 2.1.3 allows attackers to trick authenticated administrators into executing unauthorized actions. This affects all users of the vulnerable firmware version who access the web interface. Attackers can exploit active admin sessions to perform actions like device reboots or permission changes.

💻 Affected Systems

Products:
  • saTECH BCU
Versions: 2.1.3
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects web application interface; requires administrator to be logged in and visit malicious page while authenticated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control, modifies all user permissions, reboots device causing service disruption, or potentially installs persistent backdoors.

🟠

Likely Case

Attacker performs unauthorized device reboots causing temporary service outages or modifies limited permissions to gain elevated access.

🟢

If Mitigated

With proper CSRF protections and session management, exploitation attempts fail and no unauthorized actions occur.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to trick authenticated admin into visiting malicious page; no authentication bypass needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for patched version

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso-sci/multiple-vulnerabilities-arteches-satech-bcu

Restart Required: No

Instructions:

1. Check vendor advisory for patched firmware version. 2. Download updated firmware from official vendor source. 3. Apply firmware update following vendor documentation. 4. Verify update completed successfully.

🔧 Temporary Workarounds

Implement CSRF Tokens

all

Add anti-CSRF tokens to all state-changing requests in the web application

Session Timeout Reduction

all

Reduce administrator session timeout to limit exposure window

🧯 If You Can't Patch

  • Restrict web interface access to trusted networks only
  • Implement web application firewall with CSRF protection rules
  • Educate administrators to log out after sessions and avoid browsing while authenticated

🔍 How to Verify

Check if Vulnerable:

Check firmware version in web interface or device configuration; if version is 2.1.3, device is vulnerable.

Check Version:

Check web interface administration panel or device configuration interface for firmware version

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • Multiple unauthorized configuration changes from same session
  • Unexpected device reboots
  • Permission modifications without corresponding admin log entries

Network Indicators:

  • HTTP POST requests without Referer headers or CSRF tokens
  • Requests from unexpected sources to administrative endpoints

SIEM Query:

source="web_logs" AND (uri CONTAINS "/admin/" OR uri CONTAINS "/config/") AND (NOT referer CONTAINS "expected_domain" OR csrf_token="")

🔗 References

📤 Share & Export