First published: Tue Apr 14 2020(Updated: )
Cellebrite UFED 5.0 through 7.29 uses four hardcoded RSA private keys to authenticate to the ADB daemon on target devices. Extracted keys can be used to place evidence onto target devices when performing a forensic extraction.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cellebrite UFED | >=5.0<=7.29 | |
Cellebrite UFED |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11723 has a critical severity level due to the hardcoded RSA private keys allowing unauthorized access to ADB daemons on target devices.
To remediate CVE-2020-11723, upgrade to Cellebrite UFED version 7.30 or later, which addresses the vulnerability.
The implications of CVE-2020-11723 include the potential for unauthorized evidence manipulation on forensic extracted devices.
CVE-2020-11723 affects Cellebrite UFED versions from 5.0 to 7.29.
Attackers can exploit CVE-2020-11723 by using the hardcoded RSA keys to authenticate to the ADB daemon and manipulate data on target devices.