
In the case of CmActLicense, CodeMeter Runtime Service determines the required properties for the binding to the computer and hides the information related to the activation securely on the target computer. On terminal servers and in virtual environments, CodeMeter Runtime Service ensures that licenses used simultaneously on different workstations are counted separately (for each session and each machine). When running on a license server in a LAN or WAN, it also makes licenses for CodeMeter Runtime Services on network clients available.ĬodeMeter Runtime Service monitors the applications which are started and automatically assigns licenses to them in the event that any application crashes or the assignment of the license was forgotten by the developer. It is also in charge of managing available and used licenses and tracking their use. It runs in the background, usually as a service or daemon, and manages connected CmDongles, activated CmActLicenses, and the connection to the license server in LAN, WAN and cloud. The main component of CodeMeter Runtime is the CodeMeter Runtime Service. CodeMeter with a SAP back office solution.SAP Entitlement Management and CodeMeter.=> Successful exploitation of these vulnerabilities could allow an attacker to read data from the heap of the CodeMeter Runtime network server, or crash the CodeMeter Runtime Server (i.e., CodeMeter.exe). QID checks for the Vulnerable version using windows registry keysĬustomers are advised to refer to CERT MITIGATIONS section ICSA-21-210-02 for affected packages and patching details. This license manager is used in the products of many different vendors.


The following versions of CodeMeter Runtime, a license manager, are affected:ĬodeMeter Runtime: All versions prior to v7.21a => Wibu-Systems CodeMeter Runtime Multiple Vulnerabilities (ICSA-21-210-02) Please address comments about any linked pages to. Further, CVEreport does not endorse any commercial products that may be mentioned on these sites.

CVEreport does not necessarily endorse the views expressed, or concur with the facts presented on these sites. There may be other websites that are more appropriate for your purpose. No inferences should be drawn on account of other sites being referenced, or not, from this page. EXECUTIVE SUMMARY CVSS v3 9.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Wibu-Systems AG Equipment: CodeMeter Runtime Vulnerabilities: Buffer Over-read 2.

We have provided these links to other websites because they may have information that would be of interest to you. CodeMeter User Runtime : Operating System: CodeMeter Version : Notes: Windows: CodeMeter 7.40 : OS X 10.9 Mavericks and below: N/A : OS X 10.10 Yosemite: CodeMeter 7.0 : Uncheck kernel extension options when installing: OS X 10.11 El Capitan: CodeMeter 7.0 : Uncheck kernel extension options when installing: macOS 10. Home News & Events Cybersecurity Advisories ICS Advisory ICS Advisory Wibu-Systems CodeMeter Runtime Last Revised JAlert Code ICSA-21-210-02 1. By selecting these links, you may be leaving CVEreport webspace.
