VDE-2023-031

Vulnerability from csaf_trumpfsecokg - Published: 2023-09-13 10:00 - Updated: 2023-11-13 11:00
Summary
Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability
Notes
Summary: The TRUMPF CAD/CAM software tools mentioned above use the vulnerable CodeMeter Runtime (up to version 7.60b) application from WIBU-SYSTEMS AG to manage licenses within the component TRUMPF License Expert. This CodeMeter application contains new vulnerabilities, which may enable an attacker to gain full access to the server or workstation on which the TRUMPF License Expert has been installed on. A new version of the TRUMPF License Expert which fixes this vulnerability is available.Machines with a running and correctly installed mGuard hardware firewall cannot be exploited by this vulnerability if used as intended (according to the manual). Update A, 2023-11-13 Removed CVE-2023-4701 because it was revoked.
Impact: An attacker exploiting the vulnerability in WIBU CodeMeter Runtime in server mode could gain full access to the affected server via network access without any user interaction. Exploiting the vulnerability in WIBU CodeMeter Runtime in non-networked workstation mode could lead to a privilege elevation and full access on this workstation for an already authenticated user (logged in locally to the PC).
Mitigation: Implement general security best practices like network segmentation, endpoint protection and system hardening. Restrict network access to the TRUMPF License Expert server component to required clients only by using firewalls or other suitable products.
Remediation: Get the latest version of the TRUMPF License Expert software (>= V2.0.0) at trumpf.com/de_DE/produkte/software/software-lizenzierung and install it on all affected servers and workstations.

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.

CWE-787 - Out-of-bounds Write
Mitigation Implement general security best practices like network segmentation, endpoint protection and system hardening. Restrict network access to the TRUMPF License Expert server component to required clients only by using firewalls or other suitable products.
Vendor Fix Get the latest version of the TRUMPF License Expert software (>= V2.0.0) at trumpf.com/de_DE/produkte/software/software-lizenzierung and install it on all affected servers and workstations.
Acknowledgments
CERT@VDE certvde.com

{
  "document": {
    "acknowledgments": [
      {
        "organization": "CERT@VDE",
        "summary": "coordination",
        "urls": [
          "https://certvde.com"
        ]
      }
    ],
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-GB",
    "notes": [
      {
        "category": "summary",
        "text": "The TRUMPF CAD/CAM software tools mentioned above use the vulnerable CodeMeter Runtime (up to version 7.60b) application from WIBU-SYSTEMS AG to manage licenses within the component TRUMPF License Expert. This CodeMeter application contains new vulnerabilities, which may enable an attacker to gain full access to the server or workstation on which the TRUMPF License Expert has been installed on. A new version of the TRUMPF License Expert which fixes this vulnerability is available.Machines with a running and correctly installed mGuard hardware firewall cannot be exploited by this vulnerability if used as intended (according to the manual).\n\nUpdate A, 2023-11-13\nRemoved CVE-2023-4701 because it was revoked.",
        "title": "Summary"
      },
      {
        "category": "description",
        "text": "An attacker exploiting the vulnerability in WIBU CodeMeter Runtime in server mode could gain full access to the affected server via network access without any user interaction.\nExploiting the vulnerability in WIBU CodeMeter Runtime in non-networked workstation mode could lead to a privilege elevation and full access on this workstation for an already authenticated user (logged in locally to the PC).",
        "title": "Impact"
      },
      {
        "category": "description",
        "text": "Implement general security best practices like network segmentation, endpoint protection and system hardening.\nRestrict network access to the TRUMPF License Expert server component to required clients only by using firewalls or other suitable products.",
        "title": "Mitigation"
      },
      {
        "category": "description",
        "text": "Get the latest version of the TRUMPF License Expert software (\u003e= V2.0.0)\u00a0at\u00a0trumpf.com/de_DE/produkte/software/software-lizenzierung\u00a0and install it on all affected servers and workstations.",
        "title": "Remediation"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "product.security@trumpf.com",
      "name": "Trumpf SE + Co. KG",
      "namespace": "https://www.trumpf.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "VDE-2023-031: Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability - HTML",
        "url": "https://certvde.com/en/advisories/VDE-2023-031/"
      },
      {
        "category": "self",
        "summary": "VDE-2023-031: Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability - CSAF",
        "url": "https://trumpf.csaf-tp.certvde.com/.well-known/csaf/white/2023/vde-2023-031.json"
      },
      {
        "category": "external",
        "summary": "Vendor PSIRT",
        "url": "https://www.trumpf.com"
      },
      {
        "category": "external",
        "summary": "CERT@VDE Security Advisories for Trumpf SE + Co. KG",
        "url": "https://certvde.com/en/advisories/vendor/trumpf/"
      }
    ],
    "title": "Trumpf: Multiple Products affected by WIBU Codemeter Vulnerability",
    "tracking": {
      "aliases": [
        "VDE-2023-031"
      ],
      "current_release_date": "2023-11-13T11:00:00.000Z",
      "generator": {
        "date": "2025-05-14T13:50:48.706Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.25"
        }
      },
      "id": "VDE-2023-031",
      "initial_release_date": "2023-09-13T10:00:00.000Z",
      "revision_history": [
        {
          "date": "2023-09-13T10:00:00.000Z",
          "number": "1",
          "summary": "Initial revision."
        },
        {
          "date": "2023-11-13T11:00:00.000Z",
          "number": "2",
          "summary": "Update A"
        }
      ],
      "status": "final",
      "version": "2"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V1.0\u003c=V1.3",
                    "product": {
                      "name": "MonitoringAnalyzer V1.0\u003c=V1.3",
                      "product_id": "CSAFPID-51001"
                    }
                  }
                ],
                "category": "product_name",
                "name": "MonitoringAnalyzer"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V1.0.0\u003c=V3.0.22",
                    "product": {
                      "name": "Oseon V1.0.0\u003c=V3.0.22",
                      "product_id": "CSAFPID-51002"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Oseon"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V1.0.1\u003c=V4.6.3",
                    "product": {
                      "name": "ProgrammingTube V1.0.1\u003c=V4.6.3",
                      "product_id": "CSAFPID-51003"
                    }
                  }
                ],
                "category": "product_name",
                "name": "ProgrammingTube"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V18.02.R8\u003c=V23.06.01",
                    "product": {
                      "name": "TecZoneBend V18.02.R8\u003c=V23.06.01",
                      "product_id": "CSAFPID-51004"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TecZoneBend"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V14.00\u003c=V22.00.00",
                    "product": {
                      "name": "ToPsCalculation V14.00\u003c=V22.00.00",
                      "product_id": "CSAFPID-51005"
                    }
                  }
                ],
                "category": "product_name",
                "name": "ToPsCalculation"
              },
              {
                "branches": [
                  {
                    "category": "product_version",
                    "name": "V05.03.00.00",
                    "product": {
                      "name": "Tops Unfold V05.03.00.00",
                      "product_id": "CSAFPID-51006"
                    }
                  }
                ],
                "category": "product_name",
                "name": "Tops Unfold"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V1.5.2\u003c=V1.11.1",
                    "product": {
                      "name": "TrumpfLicenseExpert V1.5.2\u003c=V1.11.1",
                      "product_id": "CSAFPID-51007"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TrumpfLicenseExpert"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V08.00\u003c=V12.01.00.00",
                    "product": {
                      "name": "TruTops V08.00\u003c=V12.01.00.00",
                      "product_id": "CSAFPID-51008"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTops"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V06.00.23.00\u003c=V16.0.22",
                    "product": {
                      "name": "TruTopsBoost V06.00.23.00\u003c=V16.0.22",
                      "product_id": "CSAFPID-51009"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsBoost"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003c=V09.09.02",
                    "product": {
                      "name": "TruTops Cell Classic \u003c=V09.09.02",
                      "product_id": "CSAFPID-510010"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTops Cell Classic"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V01.00\u003c=V02.26.0",
                    "product": {
                      "name": "TruTops Cell SW48 V01.00\u003c=V02.26.0",
                      "product_id": "CSAFPID-510011"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTops Cell SW48"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V15.00.23.00\u003c=V22.8.25",
                    "product": {
                      "name": "TruTopsFab (inkl.TruTops Monitor) V15.00.23.00\u003c=V22.8.25",
                      "product_id": "CSAFPID-510012"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsFab (inkl.TruTops Monitor)"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V14.06.20\u003c=V20.04.20.00",
                    "product": {
                      "name": "TruTopsFab_Storage_SmallStore V14.06.20\u003c=V20.04.20.00",
                      "product_id": "CSAFPID-510013"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsFab_Storage_SmallStore"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V01.00\u003c=V06.01",
                    "product": {
                      "name": "TruTops Mark 3D V01.00\u003c=V06.01",
                      "product_id": "CSAFPID-510014"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTops Mark 3D"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V00.06.00\u003c=V01.00",
                    "product": {
                      "name": "TruTopsPrint V00.06.00\u003c=V01.00",
                      "product_id": "CSAFPID-510015"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsPrint"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "\u003e=V01.02",
                    "product": {
                      "name": "TruTopsPrintMultilaserAssistant \u003e=V01.02",
                      "product_id": "CSAFPID-510016"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsPrintMultilaserAssistant"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V7.0.198.241\u003c=V9.0.28148.1",
                    "product": {
                      "name": "TruTopsWeld V7.0.198.241\u003c=V9.0.28148.1",
                      "product_id": "CSAFPID-510017"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TruTopsWeld"
              },
              {
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "V08.00\u003c=V14.06.150",
                    "product": {
                      "name": "TubeDesign V08.00\u003c=V14.06.150",
                      "product_id": "CSAFPID-510018"
                    }
                  }
                ],
                "category": "product_name",
                "name": "TubeDesign"
              }
            ],
            "category": "product_family",
            "name": "Software"
          }
        ],
        "category": "vendor",
        "name": "Trumpf"
      }
    ],
    "product_groups": [
      {
        "group_id": "CSAFGID-0001",
        "product_ids": [
          "CSAFPID-51001",
          "CSAFPID-51002",
          "CSAFPID-51003",
          "CSAFPID-51004",
          "CSAFPID-51005",
          "CSAFPID-51006",
          "CSAFPID-51007",
          "CSAFPID-51008",
          "CSAFPID-51009",
          "CSAFPID-510010",
          "CSAFPID-510011",
          "CSAFPID-510012",
          "CSAFPID-510013",
          "CSAFPID-510014",
          "CSAFPID-510015",
          "CSAFPID-510016",
          "CSAFPID-510017",
          "CSAFPID-510018"
        ],
        "summary": "Affected products."
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2023-3935",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "notes": [
        {
          "category": "description",
          "text": "A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.",
          "title": "Vulnerability Description"
        }
      ],
      "product_status": {
        "known_affected": [
          "CSAFPID-51001",
          "CSAFPID-51002",
          "CSAFPID-51003",
          "CSAFPID-51004",
          "CSAFPID-51005",
          "CSAFPID-51006",
          "CSAFPID-51007",
          "CSAFPID-51008",
          "CSAFPID-51009",
          "CSAFPID-510010",
          "CSAFPID-510011",
          "CSAFPID-510012",
          "CSAFPID-510013",
          "CSAFPID-510014",
          "CSAFPID-510015",
          "CSAFPID-510016",
          "CSAFPID-510017",
          "CSAFPID-510018"
        ]
      },
      "remediations": [
        {
          "category": "mitigation",
          "details": "Implement general security best practices like network segmentation, endpoint protection and system hardening.\nRestrict network access to the TRUMPF License Expert server component to required clients only by using firewalls or other suitable products.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        },
        {
          "category": "vendor_fix",
          "details": "Get the latest version of the TRUMPF License Expert software (\u003e= V2.0.0)\u00a0at\u00a0trumpf.com/de_DE/produkte/software/software-lizenzierung\u00a0and install it on all affected servers and workstations.",
          "group_ids": [
            "CSAFGID-0001"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 9.8,
            "environmentalSeverity": "CRITICAL",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 9.8,
            "temporalSeverity": "CRITICAL",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "CSAFPID-51001",
            "CSAFPID-51002",
            "CSAFPID-51003",
            "CSAFPID-51004",
            "CSAFPID-51005",
            "CSAFPID-51006",
            "CSAFPID-51007",
            "CSAFPID-51008",
            "CSAFPID-51009",
            "CSAFPID-510010",
            "CSAFPID-510011",
            "CSAFPID-510012",
            "CSAFPID-510013",
            "CSAFPID-510014",
            "CSAFPID-510015",
            "CSAFPID-510016",
            "CSAFPID-510017",
            "CSAFPID-510018"
          ]
        }
      ],
      "title": "CVE-2023-3935"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…