First published: Wed Aug 12 2020(Updated: )
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Credit: CybersecurityCOE@eaton.com
Affected Software | Affected Version | How to fix |
---|---|---|
Eaton Secureconnect | <=1.7.3 |
Eaton has release a new version of the app v1.7.4. User's are recommended to update their apps.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6653 is a vulnerability in Eaton's Secure connect mobile app v1.7.3 and prior versions that stores user login credentials in a logcat file, which can be harvested by a malicious app or unauthorized user.
The severity of CVE-2020-6653 is low, with a severity value of 3.9.
CVE-2020-6653 affects Eaton Secureconnect mobile app v1.7.3 and prior versions, allowing user login credentials to be stored in a logcat file, posing a risk of unauthorized access to user accounts.
A malicious app or unauthorized user can exploit CVE-2020-6653 by harvesting the user login credentials stored in the logcat file and later using the information to monitor and control the user's account.
To prevent the vulnerability, it is recommended to update Eaton Secureconnect mobile app to a version newer than 1.7.3, as specified by the Eaton vulnerability advisory.