Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27800 | Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices. |
Fixes
Solution
Eaton has release a new version of the app v1.7.4. User's are recommended to update their apps.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Eaton
Published:
Updated: 2024-09-17T00:47:05.180Z
Reserved: 2020-01-09T00:00:00
Link: CVE-2020-6653
No data.
Status : Modified
Published: 2020-08-12T17:15:12.740
Modified: 2024-11-21T05:36:06.130
Link: CVE-2020-6653
No data.
OpenCVE Enrichment
No data.
EUVD