First published: Wed Sep 16 2020(Updated: )
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Wibu Codemeter | <6.90 | |
Wibu-Systems AG All versions prior to 7.10a are affected by CVE-2020-14509 and CVE-2020-14519 | ||
Wibu-Systems AG All versions prior to 7.10a are affected by CVE-2020-14517 | ||
Wibu-Systems AG All versions prior to 7.10 are affected by CVE-2020-16233 | ||
Wibu-Systems AG All versions prior to 6.81 are affected by CVE-2020-14513 | ||
Wibu-Systems AG All versions prior to 6.90 are affected by CVE-2020-14515 when using CmActLicense update files with CmActLicense Firm Code |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-14517.
CVE-2020-14517 has a severity of critical.
All versions of CodeMeter prior to 6.90 are affected, including version 6.90 or newer only if CodeMeter Runtime is running as a server.
An attacker can remotely communicate with the CodeMeter API if the server accepts external connections.
You can find more information about CVE-2020-14517 at the following reference: https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01