CVE-2020-11723

Cellebrite UFED 5.0 through 7.29 uses four hardcoded RSA private keys to authenticate to the ADB daemon on target devices. Extracted keys can be used to place evidence onto target devices when performing a forensic extraction.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cellebrite:ufed_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cellebrite:ufed:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:58

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html - Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/157217/Cellebrite-UFED-7.29-Hardcoded-ADB-Authentication-Keys.html - Third Party Advisory, VDB Entry
References () https://www.cellebrite.com/en/productupdates/ufed-and-ufed-infield-7-30-provides-new-support-for-smartphones-with-huawei-kirin-processor/ - Exploit, Vendor Advisory () https://www.cellebrite.com/en/productupdates/ufed-and-ufed-infield-7-30-provides-new-support-for-smartphones-with-huawei-kirin-processor/ - Exploit, Vendor Advisory

Information

Published : 2020-04-14 20:15

Updated : 2024-11-21 04:58


NVD link : CVE-2020-11723

Mitre link : CVE-2020-11723

CVE.ORG link : CVE-2020-11723


JSON object : View

Products Affected

cellebrite

  • ufed_firmware
  • ufed
CWE
CWE-798

Use of Hard-coded Credentials