Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
References
Configurations
History
21 Nov 2024, 05:36
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 2.1
v3 : 3.8 |
References | () https://www.eaton.com/content/dam/eaton/company/news-insights/cybersecurity/security-bulletins/Eaton-vulnerability-advisory-secure-connect-mobile-app.pdf - Vendor Advisory |
Information
Published : 2020-08-12 17:15
Updated : 2024-11-21 05:36
NVD link : CVE-2020-6653
Mitre link : CVE-2020-6653
CVE.ORG link : CVE-2020-6653
JSON object : View
Products Affected
eaton
- secureconnect