Cellebrite UFED 5.0 to 7.5.0.845 implements local operating system policies that can be circumvented to obtain a command prompt via the Windows file dialog that is reachable via the Certificate-Based Authentication option of the Wireless Network Connection screen.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/157715/Cellebrite-UFED-7.5.0.845-Desktop-Escape-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://github.com/thatguylevel | Third Party Advisory |
https://korelogic.com/Resources/Advisories/KL-001-2020-002.txt | Exploit Third Party Advisory |
https://korelogic.com/advisories.html | Third Party Advisory |
https://twitter.com/thatguylevel | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2020-05-15 18:15
Updated : 2024-02-28 17:47
NVD link : CVE-2020-12798
Mitre link : CVE-2020-12798
CVE.ORG link : CVE-2020-12798
JSON object : View
Products Affected
sun-denshi
- universal_forensic_extraction_device_touch_2_ruggedized
- universal_forensic_extraction_device_firmware
- universal_forensic_extraction_device_touch_2
- universal_forensic_extraction_device_ruggedized_panasonic_laptop
CWE
CWE-269
Improper Privilege Management