Article No° | Product Name | Affected Version(s) |
---|---|---|
PASloto | <= 1.1.3 | |
PMC programming tool 3.x.x | 3.0.0 <= 3.5.18.2 | |
266807, 266812, 266815 | PMI v8xx | <= 2.0.33992 |
PNOZsigma Configurator | < 1.5.0 | |
Software Live Video Server | <= 1.1.0 | |
Software PAS4000 | < 1.26.0 | |
Software PASvisu | < 1.14.1 | |
Software PIT User Authentication Service | < 1.1.2 | |
Software SafetyEYE Configurator | 3.0.0 <= 3.0.1 |
Several Pilz products use the 3rd party component "CodeMeter Runtime" from WIBU-SYSTEM AG to manage software licenses. This component is affected by a vulnerability, which may enable an attacker to gain full control over the system running the software product. The vulnerability can be exploited locally or over the network.
Update A, 2023-12-05
A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
When running WIBU CodeMeter Runtime in non-server mode, a local user may grant themselves improper elevated privileges. When running in server mode, a remote attacker may gain full control over the system. By default, the CodeMeter Runtime is running in non-server mode.
General Countermeasures
Product-specific Countermeasures
Pilz would like to thank CERT@VDE for coordinating publication.