Summary
A vulnerability is reported in WIBU-SYSTEMS Codemeter. WIBU-SYSTEMS Codemeter is installed by default during e!COCKPIT and WAGO-I/O-Pro (CODESYS 2.3) installations. All currently existing e!COCKPIT installation bundles and WAGO-I/O-Pro (CODESYS 2.3) installation bundles are affected with vulnerable versions of WIBU-SYSTEMS Codemeter.
Impact
WAGO controllers and IO-Devices are not affected by WIBU-SYSTEMS Codemeter vulnerabilities. However, due to compatibility reasons to the CODESYS Group CODESYS store, the e!COCKPIT and engineering software is bundled with a WIBU-SYSTEMS Codemeter installation.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
WAGO e!COCKPIT engineering software installation bundle <V1.11 | WAGO e!COCKPIT engineering software installation bundle <V1.11 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.46 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.46 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.47 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.47 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.49 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.49 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.53 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.53 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.55 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.55 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.61 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.61 | |
WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.66 | WAGO-I/O-Pro (CODESYS 2.3) engineering software installation 2.3.9.66 |
Vulnerabilities
Expand / Collapse allIn WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
Mitigation
- Use general security best practices to protect systems from local and network attacks.
- Disable the container type 'Mass Storage' in CodeMeter via the Windows Registry.
Remediation
We strongly encourage e!COCKPIT and WAGO-I/O-Pro (CODESYS 2.3) users to update WIBU-SYSTEMS Codemeter by installing the latest available stand-alone WIBU-SYSTEMS Codemeter Version.
WAGO will provide updated e!COCKPIT setup routines (Version 1.11) with the latest WIBU- SYSTEMS Codemeter version in Q2/2022.
Additionally WAGO will provide a security patch for e!COCKPIT Version 1.10 in February 2022.
WAGO will provide updated WAGO-I/O-Pro (CODESYS 2.3) (Version 2.3.9.68) setup routines with the latest WIBU-SYSTEMS Codemeter version in Q1/2022.
For further details on risk mitigation and impact of this vulnerability, please refer to the official WIBU-SYSTEMS Advisory WIBU-210910-01 at Website www.wibu.com/support/security-advisor... external link.
Further details on the corresponding CVEs can be obtained here:
cdn.wibu.com/fileadmin/wibu_downloads... external link
Revision History
Version | Date | Summary |
---|---|---|
1 | 31.01.2022 14:00 | Initial revision. |
2 | 22.05.2025 15:03 | Fix: quotation mark |