Authored CVEs
CVE # | Title | Vendor | Author(s) | Additional Details |
---|---|---|---|---|
CVE-2016-2060 | Command Execution in netd daemon |
Qualcomm | Jake Valletta | FireEye blog post |
CVE-2017-3748 | Improper access controls in nac_server binary |
Lenovo | Jake Valletta | FireEye blog post |
CVE-2017-3749 | Local backups enabled in Lenovo Idea Friend application |
Lenovo | Jake Valletta | Released with 2017-3748 + 2017-3750 |
CVE-2017-3750 | Local backups enabled in Lenovo Security application |
Lenovo | Jake Valletta | Released with 2017-3748 + 2017-3749 |
CVE-2018-18766 | Elevation of privilege in Call Dispatcher service |
SiteKiosk | Jake Valletta | |
CVE-2019-11509 | Authenticated remote code execution in administrative interface | Pulse Secure | Jake Valletta | Advisory |
CVE-2020-6917 | Race Condition Allows Digital Signature Bypassing | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-6918 | Digital Signature Not Checked Prior to Execution | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-6919 | Server Allows Communication with Untrusted Clients | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-6920 | Client Token Not Validated by Server | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-6921 | Directory Traversal Leads to File Output Path Manipulation | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-6922 | Weak Client Token Invalidation Practices Best | HP Support Assistant | Jake Valletta, Rod Deichler | Advisory |
CVE-2020-9306 | Hardcoded credentials | Telsa/Solarcity | Jake Valletta, Sam Sabetan | Blog pt1, pt2 |
CVE-2020-12878 | Execution with unnecessary privileges | Telsa/Solarcity | Jake Valletta, Sam Sabetan | Released with 2020-12878 |
CVE-2020-15467 | Authenticated command injection in administrative interface (vns3:vpn ) |
Cohesive Networks | Jake Valletta | Advisory |
CVE-2020-25217 | Authenticated command injection in administrative interface (GRP261x devices) |
Grandstream Networks | Jake Valletta, Michael Maturi | Advisory |
CVE-2020-25218 | Authentication bypass in administrative interface (GRP261x devices) |
Grandstream Networks | Jake Valletta, Michael Maturi | Advisory |
CVE-2021-28372 | Device Impersonation in Kalay Network Registration | ThroughTek | Jake Valletta, Erik Barzdukas, Dillon Franke | Advisory, blog |
Presentations & Workshops
2022
- NullCon Berlin (April, 2022) - “Careful Who You Trust - Compromising P2P Cameras at Scale” [slides]
- Qualcomm Product Security Summit (May, 2022) - “Careful Who You Trust - Compromising P2P Cameras at Scale” [slides]
2021
- Mandiant Cyber Defense Summit (October, 2021) - “Leveraging P2P Protocol Vulnerabilities to Remotely Compromise IoT Devices”
2018
- ANYCON 2018 (September, 2018) - “Navigating SEAndroid Trust Relationships: Exploitation Techniques for Modern Android Devices” [video]
2017
- ArcticCon 2017 (October, 2017) - “Navigating SEAndroid Trust Relationships: Exploitation Techniques for Modern Android Devices” [slides]
2016
- BSides Denver (October, 2016) - “Attacking the Core: Uncovering Vulnerabilities in Android System Services” [slides]
- Bsides Nashville (April, 2016) - “Put a Sock(et) in it: Understanding and Attacking Sockets on Android” [abstract] [slides] [video]
2015
- Blackhat Europe - Arsenal (November, 2015) - “Android Device Testing Framework v1.3” [abstract]
- BSides Asheville (June, 2015) - “All the Looks without the Price Tag: A Case Study of Device Security for Knock-Off Android Phones” [abstract] [slides] [video]
2014
- BruCON 0x06 (September, 2014) - “Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android” Workshop [abstract]
- Blackhat USA - Arsenal (August, 2014) - “Android Device Testing Framework” [slides] [abstract]
- CarolinaCon X (May, 2014) - “Exploiting the Bells and Whistles: Uncovering OEM Vulnerabilities in Android” [slides] [video] [abstract]
2013
- B-Sides DC (October, 2013) - “Dynamic Analysis using CobraDroid” [slides] [abstract]
- BruCON 0x05 (September, 2013) - “CobraDroid: Hooking Android Applications” [slides] [video] [abstract]
2012
- MIRcon (October, 2012) - “Finding Evil with Data Stacking” [slides]
- OWASP NYC (June, 2012) - “Finding Evil with Data Stacking” [slides] [abstract]
2011
- New York State Cyber Security Conference (June, 2011) - “Data Exfiltration using Covert Communication Channels” [slides] [tools]