Share: Email | Twitter




2020-09-10 15:18 (CEST)

Last update

2020-10-07 07:34 (CEST)




  • PAS4000 Software: all versions up to 1.21.1
  • PASvisu Software: all versions up to 1.9.0
  • PASloto Software: all versions up to 1.1.3
  • PNOZsigma Configurator Software: all versions up to 1.3.0
  • Live Video Server Software: all versions up to 1.1.0
  • SafetyEYE Configurator Software: from version 3.0.0 up to 3.0.1
  • CODESYS DevSys: all versions up to V3 3.5.12


A number of Pilz software tools use the CodeMeter Runtime application from WIBU-SYSTEMS AG to manage licences. This application contains a number of vulnerabilities, which enable an attacker to change and falsify a licence file, prevent normal operation of Code- Meter (Denial-of-Service) and potentially execute arbitrary code.


Vuln. Type
Buffer Access with Incorrect Length Value (CWE-805)

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to ...

Vuln. Type
Inadequate Encryption Strength (CWE-326)

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the ...

Vuln. Type
Origin Validation Error (CWE-346)

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API ...

Vuln. Type
Improper Resource Shutdown or Release (CWE-404)

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

Vuln. Type
Improper Input Validation (CWE-20)

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

Vuln. Type
Improper Verification of Cryptographic Signature (CWE-347)

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary ...


The stated Pilz products are supplied with the WIBU CodeMeter Runtime Software in Ver- sions lower than v6.90, which contain a number of vulnerabilities. One of the vulnerabilities enables further vulnerabilities to be exploited via the network.


  • Use the current Version 7.10 of the CodeMeter Runtime, available via the manufacturer's website.
  • Only use the CodeMeter Runtime as Client. The software tools named under affected products use the CodeMeter Runtime as Client in their default setting.
  • Pilz also recommends using a local firewall to limit unwanted access to the network ser- vices of the device with CodeMeter Runtime installed.

Reported by

Sharon Brizinov and Tal Keren of Claroty
Coordinated by CERT@VDE, CISA and BSI