Wibu Codemeter
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Wibu Codemeter.
By the Year
In 2026 there have been 1 vulnerability in Wibu Codemeter with an average score of 7.8 out of ten. Codemeter did not have any published security vulnerabilities last year. That is, 1 more vulnerability have already been reported in 2026 as compared to last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 7.80 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 0 | 0.00 |
| 2022 | 0 | 0.00 |
| 2021 | 2 | 8.30 |
| 2020 | 2 | 9.80 |
It may take a day or so for new Codemeter vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Wibu Codemeter Security Vulnerabilities
CodeMeter 6.60 contains an unquoted service path vulnerability
CVE-2020-37017
7.8 - High
- January 29, 2026
CodeMeter 6.60 contains an unquoted service path vulnerability that allows local users to potentially execute arbitrary code with elevated system privileges. Attackers can exploit the unquoted binary path in the CodeMeter Runtime Server service to inject malicious code that would execute with LocalSystem permissions.
Unquoted Search Path or Element
A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a
CVE-2021-20094
7.5 - High
- June 16, 2021
A denial of service vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to crash the CodeMeter Runtime Server.
Out-of-bounds Read
A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a
CVE-2021-20093
9.1 - Critical
- June 16, 2021
A buffer over-read vulnerability exists in Wibu-Systems CodeMeter versions < 7.21a. An unauthenticated remote attacker can exploit this issue to disclose heap memory contents or crash the CodeMeter Runtime Server.
Out-of-bounds Read
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may
CVE-2020-14517
9.8 - Critical
- September 16, 2020
Protocol encryption can be easily broken for CodeMeter (All versions prior to 6.90 are affected, including Version 6.90 or newer only if CodeMeter Runtime is running as server) and the server accepts external connections, which may allow an attacker to remotely communicate with the CodeMeter API.
Use of a Broken or Risky Cryptographic Algorithm
Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields
CVE-2020-14509
9.8 - Critical
- September 16, 2020
Multiple memory corruption vulnerabilities exist in CodeMeter (All versions prior to 7.10) where the packet parser mechanism does not verify length fields. An attacker could send specially crafted packets to exploit these vulnerabilities.
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Wibu Codemeter or by Wibu? Click the Watch button to subscribe.