In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
References
Link | Resource |
---|---|
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf | Mitigation Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf | Third Party Advisory |
https://www.wibu.com/us/support/security-advisories.html | Vendor Advisory |
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf | Mitigation Vendor Advisory |
https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf | Third Party Advisory |
https://www.wibu.com/us/support/security-advisories.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:25
Type | Values Removed | Values Added |
---|---|---|
References | () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf - Mitigation, Vendor Advisory | |
References | () https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf - Third Party Advisory | |
References | () https://www.wibu.com/us/support/security-advisories.html - Vendor Advisory |
17 Nov 2021, 18:49
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 7.1 |
CPE | cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_e:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_process_historian:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc_oa:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:2019:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sicam_230:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:2019:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_cape:14:*:*:*:*:*:*:* cpe:2.3:a:siemens:simit:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_odms:*:*:*:*:*:*:*:* |
|
CWE | CWE-59 | |
References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf - Third Party Advisory | |
References | (MISC) https://www.wibu.com/us/support/security-advisories.html - Vendor Advisory | |
References | (CONFIRM) https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf - Mitigation, Vendor Advisory |
14 Nov 2021, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-14 21:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41057
Mitre link : CVE-2021-41057
CVE.ORG link : CVE-2021-41057
JSON object : View
Products Affected
microsoft
- windows
siemens
- pss_cape
- pss_e
- simit
- simatic_process_historian
- pss_odms
- simatic_pcs_neo
- simatic_information_server
- sicam_230
- simatic_wincc_oa
wibu
- codemeter_runtime
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')