WAGO: WIBU-SYSTEMS CodeMeter Runtime vulnerabilities in multiple products
A heap-based buffer overflow vulnerability exists in WIBU-SYSTEMS CodeMeter Runtime (installed by default with WAGO e!COCKPIT and CODESYS 2.3 engineering software) caused by improper handling of libcurl and whitespace character interpretation in JavaScript. The vulnerability is triggered through SOCKS5 proxy configuration via environment variables or system configuration files. Affected products are all versions of WAGO e!COCKPIT and CODESYS 2.3 versions 2.3.9.45 through 2.3.9.70. Remote code execution is possible without authentication or user interaction.
- Network access to the port used by CodeMeter Runtime (typically port 22350 for licensing)
- Machine running WAGO e!COCKPIT or CODESYS 2.3 with WIBU-SYSTEMS CodeMeter Runtime installed
- HTTP_PROXY, HTTPS_PROXY, or ALL_PROXY environment variables set or ProxyServer registry/configuration value configured to use socks5h:// scheme
Patching may require device reboot — plan for process interruption
/api/v1/advisories/bcbbd784-239a-4d69-ad1a-53f558743267Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.