Codemeter Wibu Codemeter

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Wibu Codemeter.

By the Year

In 2026 there have been 1 vulnerability in Wibu Codemeter with an average score of 7.8 out of ten. Codemeter did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.

Year Vulnerabilities Average Score
2026 1 7.80
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 0 0.00
2021 2 8.30
2020 2 9.80

It may take a day or so for new Codemeter vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Wibu Codemeter Security Vulnerabilities

CodeMeter 6.60 contains an unquoted service path vulnerability
CVE-2020-37017 7.8 - High - January 29, 2026

CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions.

Unquoted Search Path or Element

A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a
CVE-2021-20094 7.5 - High - June 16, 2021

A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.

Out-of-bounds Read

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a
CVE-2021-20093 9.1 - Critical - June 16, 2021

A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.

Out-of-bounds Read

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may
CVE-2020-14517 9.8 - Critical - September 16, 2020

Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.

Use of a Broken or Risky Cryptographic Algorithm

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields
CVE-2020-14509 9.8 - Critical - September 16, 2020

Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Wibu Codemeter or by Wibu? Click the Watch button to subscribe.

Wibu
Vendor

subscribe