CVE-2023-3935

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wibu:codemeter_runtime:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:trumpf:oseon:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:programmingtube:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:teczonebend:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tops_unfold:05.03.00.00:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:topscalculation:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trumpflicenseexpert:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_classic:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_cell_sw48:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutops_mark_3d:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsboost:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsfab_storage_smallstore:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprint:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsprintmultilaserassistant:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:trutopsweld:*:*:*:*:*:*:*:*
cpe:2.3:a:trumpf:tubedesign:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*

History

25 Jan 2024, 20:24

Type Values Removed Values Added
First Time Phoenixcontact fl Network Manager
Phoenixcontact
Phoenixcontact activation Wizard
Phoenixcontact e-mobility Charging Suite
Phoenixcontact module Type Package Designer
Phoenixcontact iol-conf
Phoenixcontact plcnext Engineer
CPE cpe:2.3:a:phoenixcontact:iol-conf:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:e-mobility_charging_suite:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:1.2.0:beta:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:fl_network_manager:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:activation_wizard:*:*:*:*:*:moryx:*:*
cpe:2.3:a:phoenixcontact:plcnext_engineer:*:*:*:*:*:*:*:*
cpe:2.3:a:phoenixcontact:module_type_package_designer:*:*:*:*:*:*:*:*
References () https://cert.vde.com/en/advisories/VDE-2023-030/ - () https://cert.vde.com/en/advisories/VDE-2023-030/ - Third Party Advisory

Information

Published : 2023-09-13 14:15

Updated : 2024-01-25 20:24


NVD link : CVE-2023-3935

Mitre link : CVE-2023-3935

CVE.ORG link : CVE-2023-3935


JSON object : View

Products Affected

trumpf

  • oseon
  • trutopsprintmultilaserassistant
  • trutopsfab_storage_smallstore
  • trutops_cell_sw48
  • trutopsweld
  • trutopsfab
  • trutops_cell_classic
  • trutops
  • trutopsboost
  • teczonebend
  • programmingtube
  • tops_unfold
  • topscalculation
  • tubedesign
  • trutops_mark_3d
  • trutopsprint
  • trumpflicenseexpert

phoenixcontact

  • module_type_package_designer
  • activation_wizard
  • e-mobility_charging_suite
  • iol-conf
  • plcnext_engineer
  • fl_network_manager

wibu

  • codemeter_runtime
CWE
CWE-787

Out-of-bounds Write