CVE-2021-20093

9.1 CRITICAL

📋 TL;DR

CVE-2021-20093 is a buffer over-read vulnerability in Wibu-Systems CodeMeter that allows unauthenticated remote attackers to read heap memory contents or cause denial of service. This affects CodeMeter Runtime Server versions before 7.21a, potentially exposing sensitive information or crashing the service. Organizations using CodeMeter for software license management or DRM protection are at risk.

💻 Affected Systems

Products:
  • Wibu-Systems CodeMeter Runtime Server
Versions: All versions < 7.21a
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects CodeMeter Runtime Server component used by various software vendors for license management and DRM protection.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete disclosure of sensitive heap memory contents including cryptographic keys, license data, or system information leading to full system compromise.

🟠

Likely Case

Information disclosure of heap memory contents and potential denial of service through server crashes.

🟢

If Mitigated

Limited information disclosure with no critical data exposure if proper memory isolation and access controls are implemented.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation makes internet-facing instances particularly vulnerable to attacks.
🏢 Internal Only: MEDIUM - Internal systems are still vulnerable but require network access, reducing exposure surface.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public proof-of-concept code exists demonstrating memory disclosure. The unauthenticated nature makes exploitation straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.21a or later

Vendor Advisory: https://cdn.wibu.com/fileadmin/wibu_downloads/security_advisories/Advisory_WIBU-210423-01.pdf

Restart Required: Yes

Instructions:

1. Download CodeMeter Runtime Server version 7.21a or later from Wibu-Systems website. 2. Stop the CodeMeter service. 3. Install the updated version. 4. Restart the CodeMeter service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to CodeMeter Runtime Server to only trusted hosts and networks.

Use firewall rules to block external access to CodeMeter ports (default TCP 22350, 22351)

Service Disablement

all

Temporarily disable CodeMeter Runtime Server if not required for critical operations.

Windows: sc stop CodeMeterRuntime
Linux: systemctl stop codemeter

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted hosts only
  • Monitor for abnormal memory access patterns or unexpected service crashes

🔍 How to Verify

Check if Vulnerable:

Check CodeMeter version via Control Center or command line. Versions below 7.21a are vulnerable.

Check Version:

Windows: "C:\Program Files (x86)\CodeMeter\Runtime\bin\cmu.exe" --version | Linux: /usr/bin/cmu --version

Verify Fix Applied:

Verify installed version is 7.21a or higher and test that the service runs without memory access errors.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected memory access errors in CodeMeter logs
  • Service crash events in system logs
  • Abnormal network connections to CodeMeter ports

Network Indicators:

  • Unusual traffic patterns to TCP ports 22350/22351
  • Multiple connection attempts from untrusted sources

SIEM Query:

source="codemeter.log" AND ("memory" OR "buffer" OR "crash") OR destination_port IN (22350, 22351) AND NOT source_ip IN (trusted_networks)

🔗 References

📤 Share & Export