Wibu Codemeter vulnerabilities

11 known vulnerabilities affecting wibu/codemeter.

Total CVEs
11
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH7MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2020-37017HIGHCVSS 8.5v6.602026-01-29
CVE-2020-37017 [HIGH] CWE-428 CVE-2020-37017: CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentiall CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions.
cvelistv5nvd
CVE-2025-47809HIGHCVSS 8.2fixed in 8.30a2025-05-16
CVE-2025-47809 [HIGH] CWE-272 CVE-2025-47809: Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (be Wibu CodeMeter before 8.30a sometimes allows privilege escalation immediately after installation (before a logoff or reboot). For exploitation, there must have been an unprivileged installation with UAC, and the CodeMeter Control Center component must be installed, and the CodeMeter Control Center component must not have been restarted. In this scenar
cvelistv5nvd
CVE-2021-20093CRITICALCVSS 9.1≤ 7.21a2021-06-16
CVE-2021-20093 [CRITICAL] CWE-125 CVE-2021-20093: A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticat A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.
nvd
CVE-2021-20094HIGHCVSS 7.5fixed in 7.21a2021-06-16
CVE-2021-20094 [HIGH] CWE-125 CVE-2021-20094: A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthentica A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.
nvd
CVE-2020-14517CRITICALCVSS 9.8fixed in 6.902020-09-16
CVE-2020-14517 [CRITICAL] CWE-326 CVE-2020-14517: Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, inc Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
nvd
CVE-2020-14509CRITICALCVSS 9.8fixed in 7.102020-09-16
CVE-2020-14509 [CRITICAL] CWE-805 CVE-2020-14509: Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.
nvd
CVE-2020-14513HIGHCVSS 7.5fixed in 6.812020-09-16
CVE-2020-14513 [HIGH] CWE-20 CVE-2020-14513: CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specif CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.
nvd
CVE-2020-14515HIGHCVSS 7.5fixed in 6.902020-09-16
CVE-2020-14515 [HIGH] CWE-347 CVE-2020-14515: CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Co CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files w
nvd
CVE-2020-14519HIGHCVSS 7.5fixed in 7.002020-09-16
CVE-2020-14519 [HIGH] CVE-2020-14519: This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, wh
nvd
CVE-2020-16233HIGHCVSS 7.5fixed in 7.102020-09-16
CVE-2020-16233 [HIGH] CWE-404 CVE-2020-16233: An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7 An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.
nvd
CVE-2017-13754MEDIUMCVSS 5.4PoC≤ 6.50a2017-09-07
CVE-2017-13754 [MEDIUM] CWE-79 CVE-2017-13754: Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Sys Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the "server name" field in actions/ChangeConfiguration.html.
nvd