

Locate control system networks and remote devices behind firewalls and isolate them from the business network.Minimize network exposure for all control system devices and/or systems, and ensure they are not accessible from the Internet.Please see Wibu-Systems Security Advisory WIBU-210910-01 for more information.ĬISA recommends users take defensive measures to minimize the risk of exploitation of this vulnerability.General security best practices can help protect systems from local and network attacks.įor more information on products dependent on the affected CodeMeter see the following vendor security advisories: Restart CodeMeter to apply this change.Set the value of the key HKEY_LOCAL_MACHINE\SOFTWARE\WIBUSYSTEMS\CodeMeter\Server\CurrentVersion\EnabledContainerTypes” to 4294967294 (0xFFFFFFFE).If there are no CmDongles connected to the affected machine, or if the connected CmDongles are configured as HID, the CodeMeter communication with “Mass Storage” devices can be disabled at the Windows Registry as follows: Disable the container type “Mass Storage” in CodeMeter.


The following versions of CodeMeter Runtime, a license manger, are affected: Successful exploitation of this vulnerability could allow an attacker to crash the CodeMeter Runtime Server, which could cause a denial-of-service condition. Vulnerability: Improper Privilege Management.
