The Cellebrite UFED physical device 5.0 through 7.5.0.845 relies on key material hardcoded within both the executable code supporting the decryption process, and within the encrypted files themselves by using a key enveloping technique. The recovered key material is the same for every device running the same version of the software, and does not appear to be changed with each new build. It is possible to reconstruct the decryption process using the hardcoded key material and obtain easy access to otherwise protected data.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jun/31 | Exploit Mailing List Third Party Advisory |
https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt | Exploit Third Party Advisory |
http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jun/31 | Exploit Mailing List Third Party Advisory |
https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt | Exploit Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/158254/Cellebrite-EPR-Decryption-Hardcoded-AES-Key-Material.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://seclists.org/fulldisclosure/2020/Jun/31 - Exploit, Mailing List, Third Party Advisory | |
References | () https://korelogic.com/Resources/Advisories/KL-001-2020-003.txt - Exploit, Third Party Advisory |
Information
Published : 2020-06-30 19:15
Updated : 2024-11-21 05:03
NVD link : CVE-2020-14474
Mitre link : CVE-2020-14474
CVE.ORG link : CVE-2020-14474
JSON object : View
Products Affected
cellebrite
- ufed_firmware
- ufed
CWE
CWE-798
Use of Hard-coded Credentials