A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
References
Link | Resource |
---|---|
https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf | Vendor Advisory |
https://cert.vde.com/en/advisories/VDE-2023-030/ | Third Party Advisory |
https://cert.vde.com/en/advisories/VDE-2023-031/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
25 Jan 2024, 20:24
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-13 14:15
Updated : 2024-02-05 00:01
NVD link : CVE-2023-3935
Mitre link : CVE-2023-3935
CVE.ORG link : CVE-2023-3935
JSON object : View
Products Affected
trumpf
- trutops
- trutops_cell_classic
- tubedesign
- trutopsfab_storage_smallstore
- tops_unfold
- oseon
- trutops_cell_sw48
- programmingtube
- topscalculation
- teczonebend
- trutops_mark_3d
- trutopsfab
- trutopsweld
- trutopsboost
- trutopsprint
- trutopsprintmultilaserassistant
- trumpflicenseexpert
wibu
- codemeter_runtime
phoenixcontact
- fl_network_manager
- iol-conf
- e-mobility_charging_suite
- module_type_package_designer
- activation_wizard
- plcnext_engineer
CWE
CWE-787
Out-of-bounds Write