#Wibu codemeter install#
Install physical controls so no unauthorized personnel can access your industrial control and safety systems, components, peripheral equipment, and networks.Locate control and safety system networks and remote devices behind firewalls and isolate them from the business network.
We strongly recommend the following industry cybersecurity best practices. Set up network segmentation and configure firewalls to block all unauthorized access to port 22350/TCP. The latest CodeMeter version 7.10a is currently being qualified.
#Wibu codemeter upgrade#
Upgrade to BLUE Open Studio version 8.1 SP5 or 2020 which include the more secure version of CodeMeter, version 6.90a. The latest CodeMeter version 7.10a is currently being qualified.Ĭustomers should immediately implement the following additional mitigations: Upgrade to EcoStruxure Machine SCADA Expert versions 8.1 SP5 or 2020 which include the more secure version of CodeMeter, version 6.90a. Set up network segmentation and configure firewalls to block all unauthorized access to port 22350/TCP.Import license files from trusted sources only.This version is already available for download at
#Wibu codemeter update#
Manually update CodeMeter to version 7.10a. Until then, customers should note that the CodeMeter installation is independent from the affected products reported in this security notification and should immediately apply the following mitigations to reduce the risk of exploit: Affected ProductsĮcoStruxure Machine Expert (formerly known as SoMachine and SoMachine Motion) We will update this document when the remediation is available. Schneider Electric is establishing a remediation plan for all future versions of products impacted which do not have a fix available yet. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NĪn attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap. This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled.
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.ĬVSS v3.0 Base Score 8.1 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H Only CmActLicense update files with CmActLicense Firm Code are affected.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/ AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
#Wibu codemeter software#
An attacker could send specially crafted packets to exploit these vulnerabilities.ĬVSS v3.0 Base Score 7.5 | High | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HĬodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.ĬVSS v3.0 Base Score 7.4 | High | CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:HĬodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Multiple memory corruption vulnerabilities exist where the packet parser mechanism of CodeMeter (All versions prior to 7.10a) does not verify length fields.