#WIBU SYSTEMS CODEMETER UPDATE#
Manually update CodeMeter to version 7.10a. Until then, customers should note that the CodeMeter installation is independent from the affected products reported in this security notification and should immediately apply the following mitigations to reduce the risk of exploit: Affected ProductsĮcoStruxure Machine Expert (formerly known as SoMachine and SoMachine Motion) We will update this document when the remediation is available.
Schneider Electric is establishing a remediation plan for all future versions of products impacted which do not have a fix available yet. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NĪn attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap. This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.ĬVSS v3.0 Base Score 8.1 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H Only CmActLicense update files with CmActLicense Firm Code are affected.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/ AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
#WIBU SYSTEMS CODEMETER SOFTWARE#
An attacker could send specially crafted packets to exploit these vulnerabilities.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HĬodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.ĬVSS v3.0 Base Score 7.4 | High | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:HĬodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Multiple memory corruption vulnerabilities exist where the packet parser mechanism of CodeMeter (All versions prior to 7.10a) does not verify length fields.