Corporate

Tata Motors’ Sensitive Customer Data Exposed Due to Security Flaw, Company Says Issue Fixed

Tata Motors patched vulnerabilities in its E-Dukaan portal that exposed AWS credentials, customer invoices and internal dashboards

Shutterstock
Tata Motors Photo: Shutterstock
info_icon
Summary
Summary of this article
  • Tata Motors exposed sensitive customer data via E-Dukaan due to hard-coded AWS keys

  • Exposure included hundreds of thousands of invoices and 70 TB of FleetEdge telemetry

  • Admin access revealed MySQL backups and Tableau dashboards accessible to over 8,000 users

Indian automotive maker Tata Motors has fixed a series of security vulnerabilities that left sensitive customer records.

Security researcher Eaton Zveare discovered hard-coded Amazon Web Services (AWS) keys and other flaws in Tata Motors’ E-Dukaan spare-parts portal that granted administrative access to cloud storage and analytics systems, enabling access to invoices, database backups and internal dashboards. Tata Motors confirmed the reported vulnerabilities were addressed in 2023.

According to the researcher and other, the exposed material included hundreds of thousands of customer invoices containing names, mailing addresses and Permanent Account Numbers (PAN); MySQL backups and Apache Parquet files with customer communications; administrative access to a Tableau instance holding internal financial and dealer scorecard dashboards for more than 8,000 users; and more than 70 terabytes of historical vehicle and fleet telemetry tied to the company’s FleetEdge service.

How the Flaw Worked?

Zveare said the primary weakness was poor key management. Private AWS credentials were found in publicly accessible source code for the E-Dukaan portal and similarly weak client-side protections allowed encrypted keys to be decrypted on the FleetEdge front end.

Those keys effectively acted as master credentials that could be used to list, view or modify cloud buckets and analytics assets.

The researcher reported the issues to India’s Computer Emergency Response Team (CERT-In) in August 2023 and engaged with Tata Motors as fixes were applied.

Tata Motors reportedly stated that the reported flaws “were thoroughly reviewed following their identification in 2023 and were promptly and fully addressed,” but the company did not confirm whether affected customers had been notified.

Company Response

Tata Motors’ communications head, Sudeep Bhalla, said the company conducts regular audits with cybersecurity firms and maintains access logs to detect unauthorised activity. The firm also said it works with security researchers to strengthen its posture.

Security experts say exposed credentials and admin access are high-impact failures because they allow broad visibility into both personally identifiable information and sensitive corporate intelligence, from customer PANs to dealer performance metrics and fleet-tracking histories.

Even where no mass exfiltration is detected, such exposures raise risks of fraud, identity theft and industrial spying.

Published At:

Advertisement

Advertisement

Advertisement

Advertisement

×