Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10464: CWE-922 Insecure Storage of Sensitive Information in Birtech Information Technologies Industry and Trade Ltd. Co. Senseway

0
Medium
VulnerabilityCVE-2025-10464cvecve-2025-10464cwe-922cwe-312
Published: Mon Feb 09 2026 (02/09/2026, 12:49:17 UTC)
Source: CVE Database V5
Vendor/Project: Birtech Information Technologies Industry and Trade Ltd. Co.
Product: Senseway

Description

CVE-2025-10464 is a medium severity vulnerability in Birtech Information Technologies' Senseway product, involving insecure storage of sensitive information. The flaw allows an attacker with network access and low privileges to retrieve embedded sensitive data without user interaction. While the vulnerability impacts confidentiality, it does not affect integrity or availability. No known exploits are currently reported in the wild, and the vendor has not responded to disclosure attempts. The vulnerability affects version 0 of Senseway and is identified by CWE-922 and CWE-312, indicating improper storage and transmission of sensitive data. European organizations using Senseway could face data leakage risks, especially in sectors handling sensitive or regulated information. Mitigation requires implementing secure storage practices, encrypting sensitive data at rest, and restricting access controls beyond minimal privileges. Countries with higher adoption of Birtech products or strategic industries relying on Senseway are more likely to be impacted. Given the ease of exploitation over the network with low privileges and the high confidentiality impact, the severity is appropriately rated medium.

AI-Powered Analysis

AILast updated: 02/09/2026, 13:15:35 UTC

Technical Analysis

CVE-2025-10464 is a vulnerability classified under CWE-922 (Insecure Storage of Sensitive Information) and CWE-312 (Cleartext Storage of Sensitive Information) affecting the Senseway product developed by Birtech Information Technologies Industry and Trade Ltd. Co. The vulnerability allows an attacker with network access and low privileges (PR:L) to retrieve embedded sensitive data stored insecurely within the product, without requiring user interaction (UI:N). The CVSS v3.1 base score is 6.5, reflecting a medium severity level. The vulnerability impacts confidentiality (C:H) but does not affect integrity (I:N) or availability (A:N). The insecure storage likely involves sensitive data being stored in cleartext or using weak encryption mechanisms, making it accessible to unauthorized users who can access the system over the network. The vendor was contacted early but did not respond, and no patches or mitigations have been published yet. The affected version is listed as '0', which may indicate an early or initial release of Senseway. The vulnerability is significant because sensitive data leakage can lead to further attacks or compliance violations. No known exploits are currently reported in the wild, but the low complexity of exploitation and network attack vector make it a credible threat. The vulnerability highlights the importance of secure data storage practices, including encryption, access control, and secure coding standards.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive information stored within the Senseway product. This could lead to data breaches involving personal data, intellectual property, or confidential business information, potentially violating GDPR and other data protection regulations. The confidentiality impact could facilitate further attacks such as identity theft, corporate espionage, or targeted phishing campaigns. Although the vulnerability does not affect system integrity or availability, the loss of sensitive data can have severe reputational and financial consequences. Sectors such as finance, healthcare, critical infrastructure, and government agencies using Senseway are particularly at risk. The lack of vendor response and absence of patches increase the urgency for organizations to implement compensating controls. The medium severity rating suggests that while the threat is serious, it is not immediately critical, but should be addressed promptly to avoid exploitation.

Mitigation Recommendations

1. Immediately audit all instances of Senseway deployments to identify and inventory sensitive data stored by the product. 2. Implement network segmentation and strict access controls to limit network access to Senseway systems only to trusted and authenticated users. 3. Apply encryption at rest for all sensitive data stored by Senseway, using strong cryptographic algorithms and secure key management practices. 4. Monitor network traffic and system logs for unusual access patterns or attempts to retrieve sensitive data. 5. If possible, disable or restrict features of Senseway that store sensitive data until a vendor patch or update is available. 6. Educate administrators and users about the risks of insecure data storage and enforce the principle of least privilege. 7. Engage with Birtech for updates or patches and consider alternative products if the vendor remains unresponsive. 8. Prepare incident response plans specifically addressing potential data leakage scenarios related to this vulnerability. 9. Conduct regular security assessments and penetration testing focused on data storage security within Senseway environments. 10. Ensure compliance with GDPR by documenting risk assessments and mitigation efforts related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
TR-CERT
Date Reserved
2025-09-15T07:14:53.488Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989da9b4b57a58fa14eff3c

Added to database: 2/9/2026, 1:01:15 PM

Last enriched: 2/9/2026, 1:15:35 PM

Last updated: 2/9/2026, 3:23:57 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats