CVE-2020-14519

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.
References
Link Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01 Third Party Advisory US Government Resource
https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01 Third Party Advisory US Government Resource
Configurations

Configuration 1 (hide)

cpe:2.3:a:wibu:codemeter:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:03

Type Values Removed Values Added
References () https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01 - Third Party Advisory, US Government Resource () https://us-cert.cisa.gov/ics/advisories/icsa-20-203-01 - Third Party Advisory, US Government Resource

Information

Published : 2020-09-16 20:15

Updated : 2024-11-21 05:03


NVD link : CVE-2020-14519

Mitre link : CVE-2020-14519

CVE.ORG link : CVE-2020-14519


JSON object : View

Products Affected

wibu

  • codemeter
CWE
CWE-346

Origin Validation Error