First published: Tue Jun 30 2020(Updated: )
The Cellebrite UFED physical device 5.0 through 7.5.0.845 relies on key material hardcoded within both the executable code supporting the decryption process, and within the encrypted files themselves by using a key enveloping technique. The recovered key material is the same for every device running the same version of the software, and does not appear to be changed with each new build. It is possible to reconstruct the decryption process using the hardcoded key material and obtain easy access to otherwise protected data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cellebrite UFED | >=5.0<=7.5.0.845 | |
Cellebrite UFED |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14474 has been classified as a high-severity vulnerability due to its exposure of hardcoded encryption keys.
Fixing CVE-2020-14474 involves updating to the latest version of Cellebrite UFED firmware that addresses this vulnerability.
The potential impacts include unauthorized decryption of sensitive data and compromise of confidential information.
CVE-2020-14474 affects Cellebrite UFED physical devices running firmware versions from 5.0 to 7.5.0.845.
Yes, there are public discussions and exploit details available that highlight the risk associated with CVE-2020-14474.