Published:2025/07/29  Last Updated:2025/07/29

JVN#59585716
"SwitchBot" App vulnerable to insertion of sensitive information into log file

Overview

"SwitchBot" App provided by SwitchBot is vulnerable to insertion of sensitive information into log file.

Products Affected

  • "SwitchBot" App for Android versions V6.24 through V9.12
  • "SwitchBot" App for iOS versions V6.24 through V9.12

Description

"SwitchBot" App provided by SwitchBot contains the following vulnerability.

  • Insertion of sensitive information into log file (CWE-532)
    • CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N Base Score 5.9
    • CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 5.1
    • CVE-2025-53649

Impact

Sensitive user information may be exposed to an attacker who has access to the application logs.

Solution

Update the App
Update the application to the latest version according to the information provided by the developer.
The vulnerability has been fixed in the following versions.

  • Android App "SwitchBot" V9.13
  • iOS App "SwitchBot" V9.13

Vendor Status

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Soh Satoh reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-53649
JVN iPedia JVNDB-2025-000053