wibu CVE Vulnerabilities & Metrics

Focus on wibu vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About wibu Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with wibu. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total wibu CVEs: 16
Earliest CVE date: 27 Sep 2011, 19:55 UTC
Latest CVE date: 12 Sep 2024, 19:15 UTC

Latest CVE reference: CVE-2024-45182

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 100.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 100.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical wibu CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 4.57

Max CVSS: 7.5

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 6
4.0-6.9 8
7.0-8.9 5
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS wibu CVEs

These are the five CVEs with the highest CVSS scores for wibu, sorted by severity first and recency.

All CVEs for wibu

CVE-2024-45182 wibu vulnerability CVSS: 0 12 Sep 2024, 19:15 UTC

An issue was discovered in WibuKey64.sys in WIBU-SYSTEMS WibuKey before v6.70 and fixed in v.6.70 An improper bounds check allows specially crafted packets to cause an arbitrary address read, resulting in Denial of Service.

CVE-2024-45181 wibu vulnerability CVSS: 0 12 Sep 2024, 19:15 UTC

An issue was discovered in WibuKey64.sys in WIBU-SYSTEMS WibuKey before v6.70 and fixed in v.6.70. An improper bounds check allows crafted packets to cause an arbitrary address write, resulting in kernel memory corruption.

CVE-2023-3935 wibu vulnerability CVSS: 0 13 Sep 2023, 14:15 UTC

A heap buffer overflow vulnerability in Wibu CodeMeter Runtime network service up to version 7.60b allows an unauthenticated, remote attacker to achieve RCE and gain full access of the host system.

CVE-2021-41057 wibu vulnerability CVSS: 3.6 14 Nov 2021, 21:15 UTC

In WIBU CodeMeter Runtime before 7.30a, creating a crafted CmDongles symbolic link will overwrite the linked file without checking permissions.

CVE-2021-20094 wibu vulnerability CVSS: 5.0 16 Jun 2021, 12:15 UTC

A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.

CVE-2021-20093 wibu vulnerability CVSS: 6.4 16 Jun 2021, 12:15 UTC

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.

CVE-2020-16233 wibu vulnerability CVSS: 5.0 16 Sep 2020, 20:15 UTC

An attacker could send a specially crafted packet that could have CodeMeter (All versions prior to 7.10) send back packets containing data from the heap.

CVE-2020-14519 wibu vulnerability CVSS: 5.0 16 Sep 2020, 20:15 UTC

This vulnerability allows an attacker to use the internal WebSockets API for CodeMeter (All versions prior to 7.00 are affected, including Version 7.0 or newer with the affected WebSockets API still enabled. This is especially relevant for systems or devices where a web browser is used to access a web server) via a specifically crafted Java Script payload, which may allow alteration or creation of license files for when combined with CVE-2020-14515.

CVE-2020-14517 wibu vulnerability CVSS: 7.5 16 Sep 2020, 20:15 UTC

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.

CVE-2020-14515 wibu vulnerability CVSS: 5.0 16 Sep 2020, 20:15 UTC

CodeMeter (All versions prior to 6.90 when using CmActLicense update files with CmActLicense Firm Code) has an issue in the license-file signature checking mechanism, which allows attackers to build arbitrary license files, including forging a valid license file as if it were a valid license file of an existing vendor. Only CmActLicense update files with CmActLicense Firm Code are affected.

CVE-2020-14513 wibu vulnerability CVSS: 5.0 16 Sep 2020, 20:15 UTC

CodeMeter (All versions prior to 6.81) and the software using it may crash while processing a specifically crafted license file due to unverified length fields.

CVE-2020-14509 wibu vulnerability CVSS: 7.5 16 Sep 2020, 20:15 UTC

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.

CVE-2018-3991 wibu vulnerability CVSS: 7.5 05 Feb 2019, 23:29 UTC

An exploitable heap overflow vulnerability exists in the WkbProgramLow function of WibuKey Network server management, version 6.40.2402.500. A specially crafted TCP packet can cause a heap overflow, potentially leading to remote code execution. An attacker can send a malformed TCP packet to trigger this vulnerability.

CVE-2018-3990 wibu vulnerability CVSS: 7.2 05 Feb 2019, 23:29 UTC

An exploitable pool corruption vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400). A specially crafted IRP request can cause a buffer overflow, resulting in kernel memory corruption and, potentially, privilege escalation. An attacker can send an IRP request to trigger this vulnerability.

CVE-2018-3989 wibu vulnerability CVSS: 2.1 05 Feb 2019, 23:29 UTC

An exploitable kernel memory disclosure vulnerability exists in the 0x8200E804 IOCTL handler functionality of WIBU-SYSTEMS WibuKey.sys Version 6.40 (Build 2400).A specially crafted IRP request can cause the driver to return uninitialized memory, resulting in kernel memory disclosure. An attacker can send an IRP request to trigger this vulnerability.

CVE-2017-13754 wibu vulnerability CVSS: 3.5 07 Sep 2017, 13:29 UTC

Cross-site scripting (XSS) vulnerability in the "advanced settings - time server" module in Wibu-Systems CodeMeter before 6.50b allows remote attackers to inject arbitrary web script or HTML via the "server name" field in actions/ChangeConfiguration.html.

CVE-2014-8419 wibu vulnerability CVSS: 7.2 26 Nov 2014, 15:59 UTC

Wibu-Systems CodeMeter Runtime before 5.20 uses weak permissions (read and write access for all users) for codemeter.exe, which allows local users to gain privileges via a Trojan horse file.

CVE-2011-4057 wibu vulnerability CVSS: 5.0 13 Jan 2012, 18:55 UTC

Wibu-Systems AG CodeMeter Runtime 4.30c, 4.10b, and possibly other versions before 4.40 allows remote attackers to cause a denial of service (CodeMeter.exe crash) via certain crafted packets to TCP port 22350.

CVE-2011-3689 wibu vulnerability CVSS: 4.3 27 Sep 2011, 19:55 UTC

Cross-site scripting (XSS) vulnerability in Licenses.html in Wibu-Systems CodeMeter WebAdmin 3.30 and 4.30 allows remote attackers to inject arbitrary web script or HTML via the BoxSerial parameter.