Phoenix Contact: Products utilizing WIBU-SYSTEMS CodeMeter Runtime Windows Installer have a privilege escalation
A local privilege escalation vulnerability exists in Phoenix Contact products that use WIBU-SYSTEMS CodeMeter Runtime. The CodeMeter Control Center starts with elevated (administrator) privileges and retains them until restarted, allowing users to gain admin rights on freshly installed systems and access admin-level tools. Affected products include PLCnext Engineer, FL Network Manager, EV Charging Suite, MLnext Execution, MLnext Creation, Activation Wizard, and CLIPX ENGINEER ASSEMBLE. Most products can be fixed by updating CodeMeter Runtime to version 8.30a and installing product-specific patches; however, MORYX-Software Platform (Activation Wizard <1.8) has no fix available.
- Local user account on Windows system running affected Phoenix Contact software
- System has been freshly installed with vulnerable CodeMeter Runtime
- CodeMeter Control Center has not been restarted since installation
- User interaction required to trigger execution of admin-level commands
Patching may require device reboot — plan for process interruption
/api/v1/advisories/3eeb3670-db0e-4a20-ae72-a900f830d42aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.