Phoenix Contact: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products
A heap-based buffer overflow in WIBU-SYSTEMS CodeMeter Runtime—a component used by multiple Phoenix Contact products—results from improper whitespace character handling in JavaScript and vulnerability in the bundled libcurl library. An attacker can exploit this over the network without credentials to execute arbitrary code. The vulnerability affects the CodeMeter licensing and security enforcement component integrated into E-Mobility Charging Suite, FL Network Manager, IOL Conf, MTP DESIGNER, PLCnext Engineer, and Activation Wizard. Most affected Phoenix Contact products have no vendor fix available; the fix exists only in CodeMeter Runtime v7.60d and the separately packaged Activation Wizard v1.7.
- Network access to the host running CodeMeter Runtime
- CodeMeter Runtime configured to use SOCKS5 proxy (socks5h://) OR vulnerable to the JavaScript whitespace interpretation flaw
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/304fc212-e47d-4609-88fb-59282cb40c9f