Summary
A vulnerability has been found in a cryptographic library of Infineon Technologies that is part of the firmware of the CmDongles. The exploitation of this vulnerability has been classified as complex: potential attackers need physical access and require special equipment to exploit the vulnerability. In general, this vulnerability affects only ECC keys used to calculate signatures with the ECDSA algorithm.
Impact
An attack would enable an attacker to create licenses that can be transferred into arbitrary CmDongles or CmActLicenses. A scaling hack is possible which can distribute licenses that cannot be distinguished from legitimate ones.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
1080084 | ESL STICK USB A | Firmware <4.5.2 |
Vulnerabilities
Expand / Collapse allMitigation
Following measures are recommended to reduce the risk until the fixed version can be installed. Please be aware that not all mitigations apply to every possible product configuration, so please check which of these could be relevant or applicable in your case: As physical access is needed to exploit the vulnerabilities, it is recommended to take strict measures to control the access to the CmDongles, especially to the FSBs (Firm Security Box). General security best practices can help to protect systems from local and network attacks.
Remediation
Update the firmware of the CmDongle to version 4.52. The FW for the CmDongle can be downloaded on the Wibu-Systems webpage.
Revision History
Version | Date | Summary |
---|---|---|
1 | 14.01.2025 12:00 | Initial revision |
2 | 12.02.2025 17:48 | Fix: corrected self-reference, fix version |
3 | 14.05.2025 15:00 | Fix: added distribution |