CVE-2020-6653
Sensitive date stored in logcat file
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
La aplicación móvil Secure Connect de Eaton versión v1.7.3 y anteriores, almacena las credenciales de inicio de sesión del usuario en el archivo logcat cuando el usuario crea o registra la cuenta en la aplicación Móvil. Una aplicación maliciosa o un usuario no autorizado pueden recopilar la información y, posteriormente, usar la información para supervisar y controlar la cuenta del usuario y los dispositivos asociados
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-09 CVE Reserved
- 2020-08-12 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Eaton Search vendor "Eaton" | Secureconnect Search vendor "Eaton" for product "Secureconnect" | <= 1.7.3 Search vendor "Eaton" for product "Secureconnect" and version " <= 1.7.3" | android |
Affected
|