CVE-2023-3935

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:trumpf:oseon:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:programmingtube:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:teczonebend:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tops_unfold:05.03.00.00:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:topscalculation:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trumpflicenseexpert:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_sw48:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_mark_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsboost:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab_storage_smallstore:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprint:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprintmultilaserassistant:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsweld:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tubedesign:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:18

Type Values Removed Values Added
References () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory () https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/AdvisoryWIBU-230704-01-v3.0.pdf - Vendor Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory
References () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory () https://cert.vde.com/en/advisories/VDE-2023-031/ - Third Party Advisory

25 Jan 2024, 20:24

Type Values Removed Values Added
New CVE

Information

Published : 2023-09-13 14:15

Updated : 2024-11-21 08:18


NVD link : CVE-2023-3935

Mitre link : CVE-2023-3935

CVE.ORG link : CVE-2023-3935


JSON object : View

Products Affected

phoenixcontact

  • plcnext_engineer
  • module_type_package_designer
  • fl_network_manager
  • activation_wizard
  • e-mobility_charging_suite
  • iol-conf

trumpf

  • oseon
  • topscalculation
  • tops_unfold
  • trutops_mark_3d
  • tubedesign
  • trutopsfab_storage_smallstore
  • trutopsprint
  • trutops_cell_sw48
  • programmingtube
  • trutopsprintmultilaserassistant
  • trutopsfab
  • teczonebend
  • trutopsboost
  • trutops_cell_classic
  • trutops
  • trumpflicenseexpert
  • trutopsweld

wibu

  • codemeter_runtime
CWE
CWE-787

Out-of-bounds Write