logoalt Hacker News

dns_sneklast Sunday at 8:36 AM2 repliesview on HN

Does this count?

https://signal.org/blog/cellebrite-vulnerabilities/

> Given the number of opportunities present, we found that it’s possible to execute arbitrary code on a Cellebrite machine simply by including a specially formatted but otherwise innocuous file in any app on a device that is subsequently plugged into Cellebrite and scanned. There are virtually no limits on the code that can be executed.

But it was a product using a 9 year old ffmpeg build (at the time).


Replies

brigadelast Sunday at 3:53 PM

I'd still consider that an academic exercise rather than an exploit that was deployed in the real world (aka against a machine the attacker did not control)

show 1 reply
hulitulast Sunday at 4:03 PM

> Does this count?

If Signal relies on ffmpeg to play videos instead of an externall app, i would say it is broken by design.