A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.
References
Link | Resource |
---|---|
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-01.pdf | Mitigation Vendor Advisory |
https://www.tenable.com/security/research/tra-2021-24 | Exploit Patch Third Party Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-675303.pdf | Patch Third Party Advisory |
https://us-cert.cisa.gov/ics/advisories/icsa-21-210-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
|
Information
Published : 2021-06-16 05:15
Updated : 2022-10-06 10:43
NVD link : CVE-2021-20093
Mitre link : CVE-2021-20093
JSON object : View
CWE
CWE-125
Out-of-bounds Read
Products Affected
wibu
- codemeter
siemens
- simatic_pcs_neo
- pss_cape
- sicam_230_firmware
- sinec_infrastructure_network_services
- simatic_wincc_oa
- simit_simulation_platform
- sinema_remote_connect_server
- simatic_process_historian
- sicam_230
- simatic_information_server