PHOENIX CONTACT: Products utilizing WIBU-SYSTEMS CodeMeter components
Multiple critical vulnerabilities exist in WIBU-SYSTEMS CodeMeter components, with a CVSS score of 9.8 (CWE-404, CWE-805, CWE-346 - buffer overflow and memory corruption issues). These affect Phoenix Contact products including E-Mobility Charging Suite, FL Network Manager, IOL-CONF, PC Worx Engineer, and PLCnext Engineer EDU. The vulnerabilities are remotely exploitable through the CodeMeter Runtime WebSockets API without requiring authentication. WIBU-SYSTEMS released CodeMeter Runtime 7.10 to address these issues, and Phoenix Contact has released Activation Wizard 1.3.2 which bundles the patched CodeMeter Runtime and disables the WebSockets API by default.
- Network access to the CodeMeter Runtime WebSockets API port (default port 22350)
- CodeMeter Runtime must be running with WebSockets API enabled (default configuration)
- No authentication required
/api/v1/advisories/8fde5061-ec01-4573-b12c-93b733a9a094Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.