Vulnerabilities in ...
 
Notifications
Clear all

Vulnerabilities in Cellebrite

jaclaz
(@jaclaz)
Community Legend

Possibly interesting to those that use it: 

https://signal.org/blog/cellebrite-vulnerabilities/

Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed.

For example, by including a specially formatted but otherwise innocuous file in an app on a device that is then scanned by Cellebrite, it’s possible to execute code that modifies not just the Cellebrite report being created in that scan, but also all previous and future generated Cellebrite reports from all previously scanned devices and all future scanned devices in any arbitrary way (inserting or removing text, email, photos, contacts, files, or any other data), with no detectable timestamp changes or checksum failures. This could even be done at random, and would seriously call the data integrity of Cellebrite’s reports into question.

Any app could contain such a file, and until Cellebrite is able to accurately repair all vulnerabilities in its software with extremely high confidence, the only remedy a Cellebrite user has is to not scan devices. Cellebrite could reduce the risk to their users by updating their software to stop scanning apps it considers high risk for these types of data integrity problems, but even that is no guarantee.

Discussion on Hacker News:
https://news.ycombinator.com/item?id=26891811

 

jaclaz

Quote
Topic starter Posted : 22/04/2021 1:28 pm
jaclaz
(@jaclaz)
Community Legend

P.S:

And it is already on the Register:

https://www.theregister.com/2021/04/21/signal_cellebrite/

jaclaz

ReplyQuote
Topic starter Posted : 22/04/2021 1:40 pm
Share: