CVE-2020-14515
Severity
7.5HIGH
EPSS
0.1%
top 75.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 16
Latest updateMay 24
Description
CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
▶CVEListV5codemeterAll versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code., All versions prior to 7.00, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server.+1
🔴Vulnerability Details
3📋Vendor Advisories
1Red Hat▶
solr: replication handler allows a read-write operations to any location the solr user can access↗2020-08-17