In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.
References
| Link | Resource |
|---|---|
| https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf | Mitigation Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf | Third Party Advisory |
| https://www.wibu.com/us/support/security-advisories.html | Vendor Advisory |
| https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf | Mitigation Vendor Advisory |
| https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf | Third Party Advisory |
| https://www.wibu.com/us/support/security-advisories.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 06:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf - Mitigation, Vendor Advisory | |
| References | () https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf - Third Party Advisory | |
| References | () https://www.wibu.com/us/support/security-advisories.html - Vendor Advisory |
17 Nov 2021, 18:49
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : 3.6
v3 : 7.1 |
| CPE | cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_e:*:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_process_historian:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_wincc_oa:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:2019:sp1:*:*:*:*:*:* cpe:2.3:a:siemens:sicam_230:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_information_server:2019:-:*:*:*:*:*:* cpe:2.3:a:siemens:simatic_pcs_neo:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_cape:14:*:*:*:*:*:*:* cpe:2.3:a:siemens:simit:*:*:*:*:*:*:*:* cpe:2.3:a:siemens:pss_odms:*:*:*:*:*:*:*:* |
|
| CWE | CWE-59 | |
| References | (CONFIRM) https://cert-portal.siemens.com/productcert/pdf/ssa-580693.pdf - Third Party Advisory | |
| References | (MISC) https://www.wibu.com/us/support/security-advisories.html - Vendor Advisory | |
| References | (CONFIRM) https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210910-01.pdf - Mitigation, Vendor Advisory |
14 Nov 2021, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2021-11-14 21:15
Updated : 2024-11-21 06:25
NVD link : CVE-2021-41057
Mitre link : CVE-2021-41057
CVE.ORG link : CVE-2021-41057
JSON object : View
Products Affected
siemens
- pss_e
- simatic_pcs_neo
- simatic_wincc_oa
- simit
- sicam_230
- pss_odms
- simatic_process_historian
- simatic_information_server
- pss_cape
microsoft
- windows
wibu
- codemeter_runtime
CWE
CWE-59
Improper Link Resolution Before File Access ('Link Following')
