A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
References
Link | Resource |
---|---|
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf | Vendor Advisory |
https://cert.vde.com/en/advisories/VDE-2023-030/ | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2023-031/ | Third Party Advisory |
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf | Vendor Advisory |
https://cert.vde.com/en/advisories/VDE-2023-030/ | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2023-031/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 08:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory | |
References | () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory | |
References | () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory |
25 Jan 2024, 20:24
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory | |
First Time |
Phoenixcontact plcnext Engineer
Phoenixcontact Phoenixcontact iol-conf Phoenixcontact activation Wizard Phoenixcontact fl Network Manager Phoenixcontact module Type Package Designer Phoenixcontact e-mobility Charging Suite |
|
CPE | cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:* cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:* cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:* |
19 Sep 2023, 08:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Sep 2023, 14:53
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Wibu
Wibu codemeter Runtime Trumpf trutops Mark 3d Trumpf trutops Trumpf trumpflicenseexpert Trumpf trutopsboost Trumpf trutopsfab Trumpf topscalculation Trumpf trutopsprintmultilaserassistant Trumpf oseon Trumpf tops Unfold Trumpf trutops Cell Classic Trumpf trutops Cell Sw48 Trumpf Trumpf trutopsfab Storage Smallstore Trumpf trutopsprint Trumpf tubedesign Trumpf trutopsweld Trumpf programmingtube Trumpf teczonebend |
|
References | (MISC) https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory | |
References | (MISC) https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory | |
CPE | cpe:2.3:a:trumpf:trumpflicenseexpert:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:tops_unfold:05.03.00.00:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutops_cell_sw48:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:topscalculation:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsprintmultilaserassistant:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsfab_storage_smallstore:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsboost:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:programmingtube:*:*:*:*:*:*:*:* cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutops:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsweld:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsfab:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:teczonebend:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:oseon:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:tubedesign:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutopsprint:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutops_mark_3d:*:*:*:*:*:*:*:* cpe:2.3:a:trumpf:trutops_cell_classic:*:*:*:*:*:*:*:* |
13 Sep 2023, 16:34
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-13 14:15
Updated : 2024-11-21 08:18
NVD link : CVE-2023-3935
Mitre link : CVE-2023-3935
CVE.ORG link : CVE-2023-3935
JSON object : View
Products Affected
phoenixcontact
- e-mobility_charging_suite
- fl_network_manager
- iol-conf
- plcnext_engineer
- module_type_package_designer
- activation_wizard
trumpf
- trutopsfab_storage_smallstore
- trutopsfab
- tops_unfold
- oseon
- trutops
- tubedesign
- programmingtube
- topscalculation
- trutops_cell_classic
- trumpflicenseexpert
- trutops_mark_3d
- trutopsweld
- trutopsprintmultilaserassistant
- trutopsboost
- trutops_cell_sw48
- teczonebend
- trutopsprint
wibu
- codemeter_runtime
CWE
CWE-787
Out-of-bounds Write