CodeMeter Runtime Buffer Over-read (WIBU-210423-01)

critical Nessus Plugin ID 150962
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

A buffer over-read vulnerability exists in a licensing server.

Description

The remote CodeMeter runtime network server is affected by a buffer over-read vulnerability due to insufficient validation of user-supplied data. An unauthenticated, remote attacker can exploit this, via a specially crafted message, to disclose heap memory contents or crash the server.

Solution

Upgrade CodeMeter Runtime to version 7.21a or later.

See Also

http://www.nessus.org/u?70853191

Plugin Details

Severity: Critical

ID: 150962

File Name: codemeter_cve-2021-20093.nbin

Version: 1.4

Type: remote

Family: SCADA

Published: 6/23/2021

Updated: 7/12/2021

Dependencies: codemeter_network_server_detect.nbin

Risk Information

CVSS Score Source: CVE-2021-20093

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: Medium

Base Score: 6.4

Temporal Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Temporal Vector: E:POC/RL:OF/RC:C

CVSS v3

Risk Factor: Critical

Base Score: 9.1

Temporal Score: 8.2

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H

Temporal Vector: E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:wibu:codemeter_runtime

Required KB Items: Services/codemeter_network_server

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 6/10/2021

Vulnerability Publication Date: 6/10/2021

Reference Information

CVE: CVE-2021-20093