Summary
A number of Pilz software tools use the Software CodeMeter Runtime application from WIBU-SYSTEMS AG to manage licences. This application contains a number of vulnerabilities, which enable an attacker to change and falsify a licence file, prevent normal operation of Code- Meter (Denial-of-Service) and potentially execute arbitrary code.
Impact
The stated Pilz products are supplied with the WIBU Software CodeMeter Runtime Software in Ver- sions lower than v6.90, which contain a number of vulnerabilities. One of the vulnerabilities enables further vulnerabilities to be exploited via the network.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
Software CODESYS DevSys <=V3 3.5.12 | Software CodeMeter Runtime <6.90 | |
Software Live Video Server <=1.1.0 | Software CodeMeter Runtime <6.90 | |
Software PAS4000 <=1.21.1 | Software CodeMeter Runtime <6.90 | |
Software PASvisu <=1.9.0 | Software CodeMeter Runtime <6.90 | |
Software PNOZsigma <=1.3.0 | Software CodeMeter Runtime <6.90 | |
Software SafetyEYE 3.0.0<=3.0.1 | Software CodeMeter Runtime <6.90 | |
Software CodeMeter Runtime <6.90 | Software CodeMeter Runtime <6.90 |
Vulnerabilities
Expand / Collapse allProtocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.
CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.
CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.
This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.
An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.
Remediation
Use the current Version 7.10 of the Software CodeMeter Runtime, available via the manufacturer's website. www.wibu.com/de/support/anwendersoftw...
Only use the Software CodeMeter Runtime as Client. The software tools named under affected products use the Software CodeMeter Runtime as Client in their default setting.
Pilz also recommends using a local firewall to limit unwanted access to the network ser- vices of the device with Software CodeMeter Runtime installed.
Revision History
Version | Date | Summary |
---|---|---|
1 | 09/10/2020 15:18 | Initial revision. |
2 | 11/06/2024 12:27 | Fix: correct certvde domain, added self-reference |
3 | 05/14/2025 14:28 | Fix: version space, removed ia, firmware category, added distribution |