A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT)
Description
A vulnerability was identified in the handling of Bluetooth Low Energy (BLE) fixed channels (such as SMP or ATT)
Remediation
Apply vendor security updates immediately. Monitor for exploitation attempts and review access logs.
Executive Summary:
A critical vulnerability has been identified in the Statistical Database System developed by Gotac, which completely lacks authentication for critical functions. This flaw allows any remote attacker to connect to the database without credentials and gain full control to read, modify, or delete all stored data. Immediate action is required to prevent a catastrophic data breach, loss of data integrity, and severe operational disruption.
Vulnerability Details
CVE-ID: CVE-2025-10452
Affected Software: Statistical Database System developed by Gotac has a Missing Authentication Multiple Products
Affected Versions: See vendor advisory for specific affected versions
Vulnerability: The vulnerability is a critical Missing Authentication flaw. The database system fails to implement any authentication mechanism for interfaces that control data manipulation. A remote, unauthenticated attacker can directly connect to the exposed database service and execute commands with high-level privileges, effectively bypassing all security controls. Exploitation is trivial and involves sending crafted requests to the database to read, write, or delete information without needing a username, password, or any prior access.
Business Impact
This vulnerability carries a critical severity rating with a CVSS score of 9.8. Exploitation could have a devastating business impact, leading to a complete compromise of the database's confidentiality, integrity, and availability. Potential consequences include a major breach of sensitive statistical data, leading to regulatory fines and reputational damage; manipulation of critical data, resulting in flawed business intelligence and financial loss; and the complete deletion of the database, causing catastrophic operational downtime and potentially permanent data loss.
Remediation Plan
Immediate Action: The primary remediation is to apply the security patches provided by the vendor immediately. Update the Statistical Database System developed by Gotac to the latest version across all affected assets to eliminate the vulnerability. After patching, review access logs for any signs of compromise that may have occurred prior to the update.
Proactive Monitoring:
Compensating Controls: If patching cannot be performed immediately, implement the following controls to reduce risk:
Exploitation Status
Public Exploit Available: False
Analyst Notes: As of Sep 15, 2025, there are no known public exploits or reports of active exploitation in the wild. However, due to the simplicity of exploiting a missing authentication vulnerability, it is highly probable that threat actors will develop and deploy exploit code rapidly. Organizations should assume that active scanning for vulnerable systems will begin immediately.
Analyst Recommendation
Given the critical CVSS score of 9.8 and the trivial nature of exploitation, this vulnerability represents an immediate and severe risk to the organization. We strongly recommend that all affected instances of the Statistical Database System be patched immediately as the highest priority. Although this CVE is not currently on the CISA KEV list, its critical impact makes it a prime candidate for future inclusion. If patching is delayed for any reason, compensating controls must be implemented without delay to prevent a compromise.