Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Advisories
Source ID Title
EUVD EUVD EUVD-2020-27800 Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Fixes

Solution

Eaton has release a new version of the app v1.7.4. User's are recommended to update their apps.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: Eaton

Published:

Updated: 2024-09-17T00:47:05.180Z

Reserved: 2020-01-09T00:00:00

Link: CVE-2020-6653

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-08-12T17:15:12.740

Modified: 2024-11-21T05:36:06.130

Link: CVE-2020-6653

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.