Zurück zur Übersicht

Phoenix Contact: Products utilizing WIBU-SYSTEMS CodeMeter Runtime Windows Installer have a privilege escalation

VDE-2025-064
Last update
09.09.2025 09:00
Published at
09.09.2025 09:00
Vendor(s)
Phoenix Contact GmbH & Co. KG
External ID
VDE-2025-064
CSAF Document

Summary

A local privilege escalation vulnerability in Phoenix Contact products utilizing WIBU-SYSTEMS CodeMeter Runtime allows users to gain admin rights on freshly installed systems. The CodeMeter Control Center starts with elevated privileges and retains them until restarted, enabling unauthorized access to admin tools like cmd.exe.

Impact

The effect is that CodeMeter Control Center can be launched once as administrator and will remain with these privileges until it is either manually closed or the user is logged out. In this case a malicious user can navigate, for example, to C:\Windows\System32\ and right-click on cmd.exe and select "open", thus getting an administrator console. This vulnerability only affects freshly installed systems until CodeMeter Control Center is restarted.

Affected Product(s)

Model no. Product name Affected versions
Activation Wizard <1.8 Activation Wizard <1.8
1662166 CLIPX ENGINEER ASSEMBLE <=1.0.0 CLIPX ENGINEER ASSEMBLE <=1.0.0
1153520, 1153516, 1153513, 1086891, 1086889 EV Charging Suite (all upgrades) <=1.7.0 EV Charging Suite (all upgrades) <=1.7.0
1153509, 1153508, 1128335, 1086929, 1086921, 1086920 EV Charging Suite (all versions) <=1.7.0 EV Charging Suite (all versions) <=1.7.0
2702889 FL Network Manager <=8.0 FL Network Manager <=8.0
1697763 MLnext Creation <=24.10.0 MLnext Creation <=24.10.0
1391115 MLnext Execution <=1.1.3 MLnext Execution <=1.1.3
1373907, 1373909, 1373233, 1373910, 1373226, 1373236, 1373231, 1373224, 1373913, 1373912, 1373238, 1373914, 1373915, 1373916, 1373917, 1373918, 1373908, 1550573, 1550576, 1550581, 1550587, 1550580, 1550582, 1532628, 1550574, 1550589 MORYX-Software Platform Activation Wizard <1.8
1046008 PLCnext Engineer <2025.0.3 PLCnext Engineer <2025.0.3
1165889 PLCnext Engineer EDU LIC <2025.0.3 PLCnext Engineer EDU LIC <2025.0.3

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Least Privilege Violation (CWE-272)
Summary

Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenario, the local user can navigate from Import License to a privileged instance of Windows Explorer.

References

Mitigation

After installing the CodeMeter Control Center (at least once), please perform one of the following actions:
- Restart your system
- Log-out and log-in in
- Manually close or restart the CodeMeter Control Center via the system tray icon

These steps must be followed immediately after installing the CodeMeter Runtime or any product that includes the CodeMeter Runtime.

Remediation

PHOENIX CONTACT strongly recommends affected users to upgrade to CodeMeter V8.30a, which fixes these vulnerabilities. WIBU-SYSTEMS has already published this update for CodeMeter on their homepage. Since this current version of CodeMeter V8.30a has not yet been incorporated into Phoenix Contact products, we strongly recommend to download and install the current CodeMeter version directly from the WIBU-SYSTEMS homepage.

Additional Recommendations:
Regularly check the product's official webpage for updated release versions that support CodeMeter V8.30a.
Update the Activation Wizard to version 1.8 as soon as it becomes available on the product's download page.

Revision History

Version Date Summary
1 09.09.2025 09:00 Initial