Share: Email | Twitter

ID

VDE-2020-034

Published

2020-09-10 15:22 (CEST)

Last update

2020-10-07 07:49 (CEST)

Vendor(s)

PEPPERL+FUCHS
VMT GmbH

Product(s)

VMT MSS Version 1.28.1 and previous, but only if CVB by STEMMER IMAGING AG or Halcon by MVTec GmbH are included.
VMT IS Version 7.x and previous, but only if WIBU SYSTEMS CodeMeter Runtime Version lower than 7.10 is installed.

Summary

Several vulnerabilities have been discovered in the utilized component WIBU-SYSTEMS CodeMeter Runtime.

For detailed information please refer to WIBU-SYSTEMS original Advisories at https://wibu.com/support/security-advisories.html

Weaknesses



Vuln. Type
Buffer Access with Incorrect Length Value (CWE-805)
Summary

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to ...

Vuln. Type
Inadequate Encryption Strength (CWE-326)
Summary

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the ...

Vuln. Type
Origin Validation Error (CWE-346)
Summary

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API ...

Vuln. Type
Improper Resource Shutdown or Release (CWE-404)
Summary

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

Vuln. Type
Improper Input Validation (CWE-20)
Summary

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

Vuln. Type
Improper Verification of Cryptographic Signature (CWE-347)
Summary

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary ...

Impact

Pepperl+Fuchs analyzed and identified affected products.
Products are affected according to WIBU-Systems classification.

Solution

For VMT MSS
Update to WIBU Systems CodeMeter Runtime 7.10 or newer.


For VMT IS
Please contact VMT GmbH to receive support for the product update process.

In general and without any update, this product can be operated in a secure local network that has no connection to an untrusted network, like internet or global corporate IT-net.

Reported by

Sharon Brizinov and Tal Keren of Claroty
WIBU-Systems
Coordinated by CERT@VDE, CISA and BSI