Back to overview

Endress+Hauser: Multiple products utilizing vulnerable WIBU-SYSTEMS CodeMeter components

VDE-2022-019
Last update
06/02/2022 17:11
Published at
06/02/2022 17:11
Vendor(s)
Endress+Hauser AG
External ID
VDE-2022-019
CSAF Document

Summary

For detailed information please refer to WIBU SYSTEMS original Advisories at wibu.com/support/security-advisories.....

Impact

Affected Product(s)

Model no. Product name Affected versions
SFE100 DeviceCare 1.02.xx<=1.07.06 DeviceCare 1.02.xx<=1.07.06
MS21 Field Data Manager 1.4.0<=1.6.2 Field Data Manager 1.4.0<=1.6.2
SMT50 Field Xpert 1.03.xx<=1.05.xx Field Xpert 1.03.xx<=1.05.xx
SFE500 FieldCare 2.15.xx<=2.16.xx FieldCare 2.15.xx<=2.16.xx
Proline Promag W 800 OPC/UA Connectivity Server V1.3.7926 Proline Promag W 800 OPC/UA Connectivity Server V1.3.7926
SCE31B SupplyCare Enterprise 3.0.x<=3.4.x SupplyCare Enterprise 3.0.x<=3.4.x

Vulnerabilities

Expand / Collapse all

Published
09/22/2025 14:58
Weakness
Out-of-bounds Read (CWE-125)
Summary

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.

References

Published
09/22/2025 14:58
Weakness
Use After Free (CWE-416)
Summary

curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.

References

Published
09/22/2025 14:58
Weakness
Out-of-bounds Read (CWE-125)
Summary

A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.

References

Published
09/22/2025 14:58
Weakness
Improper Certificate Validation (CWE-295)
Summary

curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.

References

Published
09/22/2025 14:58
Weakness
Improper Link Resolution Before File Access ('Link Following') (CWE-59)
Summary

In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the of option of the .position() util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the of option is now treated as a CSS selector. A workaround is to not accept the value of the of option from untrusted sources.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the altField option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField option is now treated as a CSS selector. A workaround is to not accept the value of the altField option from untrusted sources.

References

Published
09/22/2025 14:58
Weakness
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') (CWE-79)
Summary

jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various *Text options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various *Text options are now always treated as pure text, not HTML. A workaround is to not accept the value of the *Text options from untrusted sources.

References

Mitigation

All vulnerabilities have already been fixed in several CodeMeter versions. Endress+Hauser recommends to use CodeMeter version >=7.40b.
The version is available at https://www.wibu.com/support.
For the Operating System WIN 7 it's recommended to update the operating system, use/re-install the Endress+Hauser Software Application supporting the newer operating system and update Code Meter to version >= 7.40b.

Remediation

Update the software application of the affected products:

# Product Name Fixed Version
SCE30B
SCE31B SupplyCare Enterprise >= 3.5.1
SCE32B
SFE100 DeviceCare >= 1.07.07
SFE500 FieldCare >= 2.17.00
SMT50
SMT70 Field Xpert >= 1.06.00
SMT77
MS20
MS21 Field Data Manager >= 1.6.3
Freeware for the
Proline Promag W 800/5W8C Proline Promag W 800 OPC/UA Connectivity Server > V1.3.7926
via Endress+Hauser Download Portal

Revision History

Version Date Summary
1.0.0 06/02/2022 17:11 Initial revision.