Zurück zur Übersicht

TRUMPF: Multiple products prone to WIBU CodeMeter vulnerabilities

VDE-2020-039
Last update
14.05.2025 14:36
Published at
27.10.2020 11:28
Vendor(s)
Trumpf SE + Co. KG
External ID
VDE-2020-039
CSAF Document

Summary

A number of TRUMPF CAD/CAM software tools use the CodeMeter Runtime application from WIBU-SYSTEMS AG to manage licences. This application contains a number of vulnerabilities, which enable an attacker to prevent normal operation of CodeMeter, resulting in a Denial-of-Service and potentially execute arbitrary code.

Impact

The stated TRUMPF CAD/CAM products are supplied with the WIBU CodeMeter Runtime Software in versions that are known to contain a number of vulnerabilities. We can not confirm at this time whether the use of vulnerable CodeMeter exposes our products to the risks described in the CVEs mentioned above. Nevertheless, we are working to replace the vulnerable versions of CodeMeter with available fixed versions.

Affected Product(s)

Model no. Product name Affected versions
TRUMPF CAD/CAM software tools vers:all/* TRUMPF CAD/CAM software tools vers:all/*

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Use of a Broken or Risky Cryptographic Algorithm (CWE-327)
Summary

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.

References

Published
22.09.2025 14:57
Weakness
Buffer Access with Incorrect Length Value (CWE-805)
Summary

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.

References

Published
22.09.2025 14:57
Weakness
Improper Verification of Cryptographic Signature (CWE-347)
Summary

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.

References

Published
22.09.2025 14:57
Weakness
Improper Input Validation (CWE-20)
Summary

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

References

Published
22.09.2025 14:57
Weakness
Origin Validation Error (CWE-346)
Summary

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

References

Published
22.09.2025 14:57
Weakness
Improper Resource Shutdown or Release (CWE-404)
Summary

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

References

Mitigation

  • Use the updated versions of the TRUMPF CAD/CAM products that will be available via your service channel shortly.
  • Until then, reduce internet usage on workstations with TRUMPF CAD/CAM products to a minimum.

Revision History

Version Date Summary
1 27.10.2020 11:28 Initial revision.
2 14.05.2025 14:36 Fix: reference category, added distribution