CVE-2023-3935

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:trumpf:oseon:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:programmingtube:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:teczonebend:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tops_unfold:05.03.00.00:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:topscalculation:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trumpflicenseexpert:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_sw48:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_mark_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsboost:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab_storage_smallstore:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprint:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprintmultilaserassistant:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsweld:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tubedesign:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
References () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory

25 Jan 2024, 20:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-13 14:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-3935

Mitre link : CVE-2023-3935

CVE.ORG link : CVE-2023-3935


JSON object : View

Products Affected

phoenixcontact

  • iol-conf
  • e-mobility_charging_suite
  • activation_wizard
  • fl_network_manager
  • plcnext_engineer
  • module_type_package_designer

trumpf

  • trutops_mark_3d
  • trumpflicenseexpert
  • tubedesign
  • trutopsfab
  • trutopsfab_storage_smallstore
  • trutopsboost
  • trutopsprint
  • trutopsprintmultilaserassistant
  • oseon
  • trutops
  • topscalculation
  • trutops_cell_sw48
  • trutopsweld
  • trutops_cell_classic
  • teczonebend
  • tops_unfold
  • programmingtube

wibu

  • codemeter_runtime
CWE
CWE-787

Out-of-bounds Write