First published: Wed Sep 16 2020(Updated: )
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Wibu-Systems AG | ||
Wibu-Systems AG | ||
Wibu-Systems AG | ||
Wibu-Systems AG | ||
Wibu-Systems AG | ||
Wibu-Systems AG CodeMeter Runtime | <6.90 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-14517.
CVE-2020-14517 has a severity of critical.
All versions of CodeMeter prior to 6.90 are affected, including version 6.90 or newer only if CodeMeter Runtime is running as a server.
An attacker can remotely communicate with the CodeMeter API if the server accepts external connections.
You can find more information about CVE-2020-14517 at the following reference: https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01