Wibu-Systems CodeMeter (Update F)
Wibu-Systems CodeMeter contains multiple critical vulnerabilities in its WebSockets API that allow unauthenticated remote attackers to forge license files, read heap memory, cause denial of service, and potentially execute arbitrary code. The vulnerabilities stem from weak cryptographic signature validation (CWE-346, CWE-347), insufficient input validation (CWE-20, CWE-404), insufficient key length (CWE-326), and buffer overflow conditions (CWE-805). CodeMeter is a widely used software licensing and protection platform embedded in control system software from dozens of vendors. Successful exploitation could allow an attacker to disable third-party software, alter licensing restrictions, crash the runtime, or gain code execution on hosts running CodeMeter.
- Network reachability to CodeMeter WebSockets API (default port 22350)
- CodeMeter Runtime running with WebSockets API enabled
- No authentication required for exploitation
- Vulnerable CodeMeter version: 7.10 or earlier, 7.10a or earlier, 6.90 or earlier, or 6.81 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/e5416839-1c03-482c-8aea-2f4bb3ece8cd