Summary
For detailed information please refer to WIBU SYSTEMS original Advisories at wibu.com/support/security-advisories.....
Impact
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
SFE100 | DeviceCare 1.02.xx<=1.07.06 | DeviceCare 1.02.xx<=1.07.06 |
MS21 | Field Data Manager 1.4.0<=1.6.2 | Field Data Manager 1.4.0<=1.6.2 |
SMT50 | Field Xpert 1.03.xx<=1.05.xx | Field Xpert 1.03.xx<=1.05.xx |
SFE500 | FieldCare 2.15.xx<=2.16.xx | FieldCare 2.15.xx<=2.16.xx |
Proline Promag W 800 OPC/UA Connectivity Server V1.3.7926 | Proline Promag W 800 OPC/UA Connectivity Server V1.3.7926 | |
SCE31B | SupplyCare Enterprise 3.0.x<=3.4.x | SupplyCare Enterprise 3.0.x<=3.4.x |
Vulnerabilities
Expand / Collapse allA buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.
A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.
curl 7.41.0 through 7.73.0 is vulnerable to an improper check for certificate revocation due to insufficient verification of the OCSP response.
In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the of
option of the .position()
util from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the of
option is now treated as a CSS selector. A workaround is to not accept the value of the of
option from untrusted sources.
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of the altField
option of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. Any string value passed to the altField
option is now treated as a CSS selector. A workaround is to not accept the value of the altField
option from untrusted sources.
jQuery-UI is the official jQuery user interface library. Prior to version 1.13.0, accepting the value of various *Text
options of the Datepicker widget from untrusted sources may execute untrusted code. The issue is fixed in jQuery UI 1.13.0. The values passed to various *Text
options are now always treated as pure text, not HTML. A workaround is to not accept the value of the *Text
options from untrusted sources.
Mitigation
All vulnerabilities have already been fixed in several CodeMeter versions. Endress+Hauser recommends to use CodeMeter version >=7.40b.
The version is available at https://www.wibu.com/support.
For the Operating System WIN 7 it's recommended to update the operating system, use/re-install the Endress+Hauser Software Application supporting the newer operating system and update Code Meter to version >= 7.40b.
Remediation
Update the software application of the affected products:
# | Product Name | Fixed Version |
---|---|---|
SCE30B | ||
SCE31B | SupplyCare Enterprise | >= 3.5.1 |
SCE32B | ||
SFE100 | DeviceCare | >= 1.07.07 |
SFE500 | FieldCare | >= 2.17.00 |
SMT50 | ||
SMT70 | Field Xpert | >= 1.06.00 |
SMT77 | ||
MS20 | ||
MS21 | Field Data Manager | >= 1.6.3 |
Freeware for the | ||
Proline Promag W 800/5W8C | Proline Promag W 800 OPC/UA Connectivity Server | > V1.3.7926 |
via Endress+Hauser Download Portal |
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 06/02/2022 17:11 | Initial revision. |