Vulnerability Details : CVE-2020-6653
Eaton's Secure connect mobile app v1.7.3 & prior stores the user login credentials in logcat file when user create or register the account on the Mobile app. A malicious app or unauthorized user can harvest the information and later on can use the information to monitor and control the user's account and associated devices.
Vulnerability category: Information leak
Products affected by CVE-2020-6653
- cpe:2.3:a:eaton:secureconnect:*:*:*:*:*:android:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-6653
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 10 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-6653
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
3.8
|
LOW | CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N |
0.2
|
3.6
|
Eaton | |
3.9
|
LOW | CVSS:3.1/AV:P/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N |
0.3
|
3.6
|
NIST |
CWE ids for CVE-2020-6653
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by:
- CybersecurityCOE@eaton.com (Secondary)
- nvd@nist.gov (Primary)
-
Information written to log files can be of a sensitive nature and give valuable guidance to an attacker or expose sensitive user information.Assigned by:
- CybersecurityCOE@eaton.com (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2020-6653
Jump to