CVE-2019-17394

9.8 CRITICAL

📋 TL;DR

The Seesaw Parent and Family Android app version 6.2.5 stores authentication credentials (username and password) in system logs during login. This allows attackers with physical access or malware on the device to extract credentials via logcat. All users of the vulnerable app version are affected.

💻 Affected Systems

Products:
  • Seesaw Parent and Family
Versions: 6.2.5 for Android
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Android mobile application version 6.2.5. Requires app to be installed and used for authentication.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to user accounts, potentially compromising sensitive parent/student information, communication history, and enabling account takeover.

🟠

Likely Case

Malicious apps or users with physical access extract credentials from device logs, leading to unauthorized account access and potential data exposure.

🟢

If Mitigated

With proper logging controls and app sandboxing, credential exposure is limited, though still present in system logs.

🌐 Internet-Facing: LOW - This is a local device vulnerability, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Physical access or malware on the device can easily extract credentials from logs.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to device logs via logcat, which can be achieved through physical access, malware, or debugging tools. No authentication bypass needed once logs are accessible.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 6.2.5

Vendor Advisory: https://pastebin.com/h8v0qxZH

Restart Required: No

Instructions:

1. Open Google Play Store 2. Search for Seesaw Parent and Family 3. Update to latest version 4. Verify version is above 6.2.5

🔧 Temporary Workarounds

Disable Debug Logging

android

Prevent credential logging by disabling debug logging in the app or system

adb shell setprop log.tag.Seesaw DEBUG
Configure app to not log sensitive data

Restrict Log Access

android

Limit access to logcat on Android devices

adb shell pm deny com.android.shell android.permission.READ_LOGS
Use device management policies to restrict log access

🧯 If You Can't Patch

  • Uninstall the vulnerable app version and use web interface instead
  • Implement mobile device management (MDM) to restrict log access and monitor for credential extraction attempts

🔍 How to Verify

Check if Vulnerable:

1. Install app version 6.2.5 2. Authenticate 3. Run: adb logcat | grep -i 'username\|password\|auth' 4. Check if credentials appear in logs

Check Version:

adb shell dumpsys package com.seesaw.parents | grep versionName

Verify Fix Applied:

1. Update to latest version 2. Repeat authentication 3. Verify no credentials appear in logcat output

📡 Detection & Monitoring

Log Indicators:

  • Username and password strings in Android logcat
  • Seesaw authentication logs containing credential data

Network Indicators:

  • Unusual authentication patterns from same device
  • Multiple failed logins followed by success

SIEM Query:

source="android_logs" AND ("username" OR "password") AND app="Seesaw Parent"

🔗 References

📤 Share & Export