CVE-2020-6653

Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eaton:secureconnect:*:*:*:*:*:android:*:*

History

21 Nov 2024, 05:36

Type Values Removed Values Added
CVSS v2 : 2.1
v3 : 3.9
v2 : 2.1
v3 : 3.8
References () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-vulnerability-advisory-secure-connect-mobile-app.pdf - Vendor Advisory () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-vulnerability-advisory-secure-connect-mobile-app.pdf - Vendor Advisory

Information

Published : 2020-08-12 17:15

Updated : 2024-11-21 05:36


NVD link : CVE-2020-6653

Mitre link : CVE-2020-6653

CVE.ORG link : CVE-2020-6653


JSON object : View

Products Affected

eaton

  • secureconnect
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-532

Insertion of Sensitive Information into Log File