CVE-2020-14517
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
Published
2020-09-16T20:15:13.647
Last Modified
2024-11-21T05:03:26.437
Status
Modified
Source
[email protected]
Severity
CVSSv3.1: 9.8 (CRITICAL)
CVSSv2 Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
- Access Vector: NETWORK
- Access Complexity: LOW
- Authentication: NONE
- Confidentiality Impact: PARTIAL
- Integrity Impact: PARTIAL
- Availability Impact: PARTIAL
Exploitability Score
10.0
Impact Score
6.4
Weaknesses
-
Type: Secondary
CWE-326
-
Type: Primary
CWE-327
Affected Vendors & Products
Type |
Vendor |
Product |
Version/Range |
Vulnerable? |
Application |
wibu
|
codemeter
|
< 6.90 |
Yes
|
References