CVE-2021-41057

7.1 HIGH

📋 TL;DR

This vulnerability in WIBU CodeMeter Runtime allows local attackers to overwrite arbitrary files via a crafted symbolic link attack. It affects systems running CodeMeter Runtime before version 7.30a, potentially leading to privilege escalation or system compromise. The attack requires local access to the system.

💻 Affected Systems

Products:
  • WIBU CodeMeter Runtime
Versions: All versions before 7.30a
Operating Systems: Linux, Windows, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all default installations of CodeMeter Runtime before the patched version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Privilege escalation to root/system administrator, complete system compromise, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation allowing attackers to gain higher privileges than their current user account.

🟢

If Mitigated

Limited impact with proper access controls and monitoring in place.

🌐 Internet-Facing: LOW - Requires local access to exploit, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal attackers with local access could exploit this for privilege escalation.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access and ability to create symbolic links. No public exploit code is known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.30a and later

Vendor Advisory: https://www.wibu.com/us/support/security-advisories.html

Restart Required: Yes

Instructions:

1. Download CodeMeter Runtime version 7.30a or later from WIBU website. 2. Stop CodeMeter service. 3. Install the updated version. 4. Restart the service/system.

🔧 Temporary Workarounds

Restrict Symbolic Link Creation

all

Limit ability to create symbolic links to trusted users only

chmod 700 /usr/bin/ln (Linux)
Set appropriate file permissions on Windows

Disable CodeMeter Service

all

Temporarily disable CodeMeter Runtime if not required

systemctl stop codemeter (Linux)
sc stop CodeMeter (Windows)

🧯 If You Can't Patch

  • Implement strict access controls to limit who can create symbolic links
  • Monitor for unusual file modification activities and symbolic link creation

🔍 How to Verify

Check if Vulnerable:

Check CodeMeter Runtime version using 'cmu --version' or check installed version in control panel

Check Version:

cmu --version (Linux) or check in Windows Programs and Features

Verify Fix Applied:

Verify version is 7.30a or higher using version check command

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file overwrites in CodeMeter directories
  • Multiple failed file access attempts

Network Indicators:

  • None - local attack only

SIEM Query:

Process creation events for symbolic link utilities (ln, mklink) followed by file modification in CodeMeter paths

🔗 References

📤 Share & Export