CVE-2020-14474

The Cellebrite UFED physical device 5.0 through 7.5.0.845 relies on key material hardcoded within both the executable code supporting the decryption process, and within the encrypted files themselves by using a key enveloping technique. The recovered key material is the same for every device running the same version of the software, and does not appear to be changed with each new build. It is possible to reconstruct the decryption process using the hardcoded key material and obtain easy access to otherwise protected data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cellebrite:ufed_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:cellebrite:ufed:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html - Exploit, Third Party Advisory, VDB Entry
References () http://seclists.org/fulldisclosure/2020/Jun/31 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2020/Jun/31 - Exploit, Mailing List, Third Party Advisory
References () https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt - Exploit, Third Party Advisory () https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt - Exploit, Third Party Advisory

Information

Published : 2020-06-30 19:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14474

Mitre link : CVE-2020-14474

CVE.ORG link : CVE-2020-14474


JSON object : View

Products Affected

cellebrite

  • ufed_firmware
  • ufed
CWE
CWE-798

Use of Hard-coded Credentials