First published: Wed Sep 16 2020(Updated: )
This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.
Credit: ics-cert@hq.dhs.gov
Affected Software | Affected Version | How to fix |
---|---|---|
Wibu Codemeter | <7.00 | |
Wibu-Systems AG All versions prior to 7.10a are affected by CVE-2020-14509 and CVE-2020-14519 | ||
Wibu-Systems AG All versions prior to 7.10a are affected by CVE-2020-14517 | ||
Wibu-Systems AG All versions prior to 7.10 are affected by CVE-2020-16233 | ||
Wibu-Systems AG All versions prior to 6.81 are affected by CVE-2020-14513 | ||
Wibu-Systems AG All versions prior to 6.90 are affected by CVE-2020-14515 when using CmActLicense update files with CmActLicense Firm Code |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14519 is a vulnerability that allows an attacker to use the internal WebSockets API for CodeMeter.
All versions prior to 7.00 of CodeMeter are affected by CVE-2020-14519.
An attacker can exploit CVE-2020-14519 by using the internal WebSockets API for CodeMeter.
CVE-2020-14519 has a severity rating of 7.5 (high).
You can find more information about CVE-2020-14519 at the following link: [https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01](https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01)