Share: Email | Twitter

ID

VDE-2020-031

Published

2020-10-27 14:10 (CET)

Last update

2020-10-27 14:10 (CET)

Vendor(s)

Endress+Hauser AG

Product(s)

Article No° Product Name Affected Version(s)
SFE 100 DeviceCare 1.02 <= 1.07
SFE 500 FieldCare = 2.15.00
MS20 Field Data Manager 1.4.0 <= 1.5.1
MS21 Field Data Manager 1.4.0 <= 1.5.1
SMT70 FieldXpert 1.03 <= 1.05
SMT77 FieldXpert 1.03 <= 1.05
71350102 OPC UA Connectivity Server = 1.2.0
SCE30B SupplyCare Enterprise 3.0 <= 3.3
SCE31B SupplyCare Enterprise 3.0 <= 3.3
SCE32B SupplyCare Enterprise 3.0 <= 3.3

Summary

For further Information please refer to WIBU Advisories directly at https://wibu.com/support/security-advisories.html and the aforementioned CVE-IDs.

Vulnerabilities



Last Update
March 3, 2022, 12:09 p.m.
Weakness
Buffer Access with Incorrect Length Value (CWE-805)
Summary

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.

Last Update
Oct. 6, 2020, 8:19 p.m.
Weakness
Inadequate Encryption Strength (CWE-326)
Summary

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.

Last Update
Oct. 6, 2020, 1:19 p.m.
Weakness
Improper Resource Shutdown or Release (CWE-404)
Summary

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

Last Update
March 3, 2022, 12:09 p.m.
Weakness
Origin Validation Error (CWE-346)
Summary

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

Last Update
Oct. 6, 2020, 8:19 p.m.
Weakness
Improper Input Validation (CWE-20)
Summary

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

Last Update
Oct. 6, 2020, 8:19 p.m.
Weakness
Improper Verification of Cryptographic Signature (CWE-347)
Summary

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.

Impact

For further Information please refer to WIBU Advisories directly at https://wibu.com/support/security-advisories.html and the aforementioned CVE-IDs.

Solution

Mitigation
Most vulnerabilities have already been fixed in the current Code Meter versions 7.10. Use of this version requires additional mitigation measures to fix all CVEs. For detailed information please refer to WIBU SYSTEMS original Advisories at https://wibu.com/support/security-advisories.html.


Solution
WIBU SYSTEMS has released a new Code Meter Runtime version 7.10a dated on 16.9.2020. All the known vulnerabilities are fixed with this version. The version is available at https://www.wibu.com/support.

Reported by

Sharon Brizinov and Tal Keren of Claroty reported these vulnerabilites to WIBU Systems.
Coordinated by CERT@VDE, CISA and BSI