Loading
myRockwellAutomation
工作机会
投资者
PartnerNetwork 门户
联系我们
热门资源
兼容性和下载中心 (PCDC) 知识库 Literature Library 生命周期状态 Learning+ 培训门户
 
产品管理
资产管理 (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service 产品注册 维修 服务合同和票据 软件激活 软件订阅 可持续性仪表板
 
产品配置和选型
顾问 材料单 CrossWorks Integrated Architecture Builder 产品目录 ProposalWorks 方案生成器 ProposalWorks 标准制定者 Safety Automation Builder
 

 

查看全部工具 →

InformationInformation
This content is not available in your selected language.
Rockwell Automation 徽标
产品
硬件
硬件新动向
电路和负载保护 状态监测 连接设备 分布式控制系统 变频器 能源监测 人机界面 (HMI) 独立推车技术 工业计算机和监视器 工业控制产品 输入/输出模块 照明控制
运动控制 马达控制 网络安全与基础架构 成套解决方案 电源 可编程控制器 按钮和信号设备 继电器和计时器 安全仪表系统 安全产品 传感器和开关 信号接口
软件
软件新动向
云软件
软件订阅
 
设计
Studio 5000 FactoryTalk Logix Echo Emulate3D 数字孪生体 Arena 仿真 FactoryTalk Design Studio FactoryTalk Twin Studio FactoryTalk Vault
 
分析与数据
FactoryTalk Analytics FactoryTalk Historian FactoryTalk Analytics LogixAI FactoryTalk DataMosaix FactoryTalk Energy Manager Thingworx 工业物联网 FactoryTalk Transaction Manager FactoryTalk Analytics VisionAI FactoryTalk Analytics Pavilion8
HMI
FactoryTalk View FactoryTalk Optix
 
MES
Plex MES Plex 质量管理 FactoryTalk PharmaSuite Finite Scheduler
 
性能监控
Plex 生产监控 FactoryTalk Metrics 整体设备效率
 
瘦客户端管理
ThinManager
维护
Plex APM Fiix CMMS FactoryTalk AssetCentre FactoryTalk Remote Access FactoryTalk Network Manager Emonitor
 
过程
PlantPAx FactoryTalk Batch
 
工业通信
FactoryTalk Linx
 
XR/增强现实
Vuforia
产品名录 Allen-Bradley FactoryTalk
服务
资产优化与团队服务
资产优化服务概述 设备维修 设备再制造 维修与库存协议 集成服务协议 远程支持与监视 现场服务 安全服务 培训服务
网络安全与网络基础设施
网络安全 工业网络基础设施 预先设计的网络解决方案
数字主线
概述
生产自动化
概述
Loading
LifecycleIQ 服务
解决方案与行业
解决方案
高级运动与机器人技术 资产管理 网络安全 数据操作和分析 数字主线 数字化转型 工业自动化和控制 工业部件 网络与基础设施 机旁控制解决方案
成套解决方案 过程解决方案 生产自动化 制造运营管理 安全解决方案  可扩展控制与可视化 智能制造 可持续解决方案 赋能劳动力
 
解决方案适用于
原始设备制造商
行业
汽车与轮胎行业 水泥 化工 娱乐 化纤与纺织 食品和饮料 家庭与个人护理 氢气 基础设施 生命科学
船舶 冶金 矿山 石油和天然气 发电 印刷和出版 纸浆和造纸 半导体 仓储和履单 水/污水处理
Loading
查看案例研究
支持
文档
技术文档中心 产品图纸和接线图 产品认证 版本说明 技术规格
产品支持
下载 选型与配置 管理
培训
网络研讨会 员工发展培训 教师指导课程 认证计划 工作指导 培训工作站 Learning+ 订阅式在线学习课程
联系我们
TechConnect 支持 客户服务中心 Software Portal Help 一般查询
TechConnect 支持
一位戴耳机的男士正在提供客户服务支持
TechConnect 支持

获取解决技术挑战的知识和帮助。

了解有关 TechConnect 的更多信息
兼容性和下载中心 (PCDC) 知识库 Literature Library Engage Online Community
销售与合作伙伴
查找合作伙伴
转到合作伙伴搜索器
 
我们的 PartnerNetwork
PartnerNetwork 计划 分销商合作伙伴 许可开发商
原始设备制造商 (OEM) 合作伙伴 系统集成商合作伙伴 技术合作伙伴
PartnerNetwork™ 是什么?
两个人正在使用平板电脑进行交互
PartnerNetwork™ 是什么?

我们的 Rockwell Automation PartnerNetwork™ 计划帮助客户找到更佳人力、产品、服务与解决方案,以满足其生产目标,并使互联企业成为现实。

立即探索
myRockwellAutomation
工作机会
投资者
PartnerNetwork 门户
联系我们
资源
热门资源
兼容性和下载中心 (PCDC) 知识库 Literature Library 生命周期状态 Learning+ 培训门户
 
产品管理
资产管理 (RAAMP) Installed Base Evaluation (IBE) My Equipment Self-Service 产品注册 维修 服务合同和票据 软件激活 软件订阅 可持续性仪表板
 
产品配置和选型
顾问 材料单 CrossWorks Integrated Architecture Builder 产品目录 ProposalWorks 方案生成器 ProposalWorks 标准制定者 Safety Automation Builder
 

 

查看全部工具 →

选择国家或地区
  • 中国
  • Argentina
  • Australia
  • Belgique | Belgium
  • Brasil
  • Canada
  • Colombia
  • Czech Republic
  • Denmark
  • Deutschland
  • España
  • Finland
  • France
  • Hungary
  • India
  • Indonesia
  • Ireland
  • Israel
  • Italia
  • México
  • Netherlands
  • New Zealand
  • Norway
  • Poland
  • Portugal
  • Puerto Rico
  • Romania
  • Russia
  • Schweiz | Suisse
  • Singapore
  • South Africa
  • Sweden
  • Turkey
  • Ukraine
  • United Arab Emirates
  • United Kingdom
  • United States
  • Österreich
  • 台灣, 中國
  • 日本
  • 한국
选择语言
  • 简体中文
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • Português
  • 日本語
  • 繁體中文
  • 한국어
登录 Create an Account
Why Create an Account?
Create bills of materials, submit repair quotes, register products and more!

Manage your e-communication subscription preferences.

Manage your user profile.
Welcome, {0}
Residing Location
我的帐户 注销
您近期的搜索记录
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
  • HistoryHistory
    CloseClose
所有
产品
文档
下载
建议搜索词条
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
  • SearchSearch
“{0}” 的结果
查看所有结果
“{0}” 的产品结果
Product Image
Product Image
Product Image
查看所有产品结果
“{0}” 的文档结果
Portable Document Format.pdf file type
发布类型 发布日期 语言
Portable Document Format.pdf file type
发布类型 发布日期 语言
Portable Document Format.pdf file type
发布类型 发布日期 语言
查看所有文档结果
“{0}” 的下载结果
DownloadDownload
目录编号
DownloadDownload
目录编号
DownloadDownload
目录编号
查看所有下载结果

PN1530 | FactoryTalk Activation Manager affected by CodeMeter Vulnerabilities

Severity:
Critical,
High
Advisory ID:
PN1530
发布日期:
September 18, 2020
上次更新时间:
September 18, 2020
Revision Number:
4.0
Known Exploited Vulnerability (KEV):
否
Corrected:
否
Workaround:
否
CVE IDs
CVE-2020-14517,
CVE-2020-16233,
CVE-2019-14519,
CVE-2020-14519,
CVE-2020-14515,
CVE-2020-14509,
CVE-2020-14513
摘要
FactoryTalk Activation Manager affected by CodeMeter Vulnerabilities

Revision History
Revision Number
4.0
Revision History
Version 4.0 -- September 18, 2020. Update to reflect current mitigations. Updated links.
Version 3.0 -- September 16, 2020. Update to reflect current remediations and information from Wibu. See update below.
Version 2.1 -- September 15, 2020. Update to adjust language.
Version 2.0 -- September 14, 2020. Update regarding affected CodeMeter versions and vulnerability information.
Version 1.0 – September 08, 2020

Executive Summary

Rockwell Automation received a report from Claroty, an industrial security product vendor and research company, regarding vulnerabilities in Wibu-Systems’ CodeMeter. These vulnerabilities, if successfully exploited, may result in remote code execution, privilege escalation, or denial of service conditions to the products dependent on CodeMeter. CodeMeter is distributed as part of the installation for FactoryTalk Activation Manager. FactoryTalk Activation Manager enables customers to manage licensed content and activate Rockwell Automation software products.

Claroty has released documentation that outlines the vulnerabilities in detail. This information may make it easier for an adversary to compromise the host running Wibu CodeMeter. Customers using the affected versions of FactoryTalk Activation Manager and/or CodeMeter should implement the mitigations detailed below as soon as possible.

Affected Products

FactoryTalk Activation (FTA) Manager v4.05.00 and earlier running Wibu-Systems CodeMeter v7.10 or earlier.

The following products require FactoryTalk Activation Manager to store and keep track of Rockwell Automation software products and activation files. Customers who use the products from the following list in their install base contain FactoryTalk Activation Manager.
  • Arena® software
  • Emonitor® software
  • FactoryTalk® AssetCentre software
  • FactoryTalk® Batch software
  • FactoryTalk® EnergyMetrix™ software
  • FactoryTalk® eProcedure® software
  • FactoryTalk® Gateway software
  • FactoryTalk® Historian Site Edition (SE) software
  • FactoryTalk® Historian Classic software
  • FactoryTalk® Information Server software
  • FactoryTalk® Metrics software
  • FactoryTalk® Transaction Manager software
  • FactoryTalk® VantagePoint® software
  • FactoryTalk® View Machine Edition (ME) software
  • FactoryTalk® View Site Edition (SE) software
  • FactoryTalk® ViewPoint software
  • RSFieldbus™ software
  • RSLinx® Classic software
  • RSLogix 500® software
  • RSLogix 5000® software
  • RSLogix™ 5 software
  • RSLogix™ Emulate 5000 software
  • RSNetWorx™ software
  • RSView®32 software
  • SoftLogix™ 5800 software
  • Studio 5000 Architect® software
  • Studio 5000 Logix Designer® software
  • Studio 5000 View Designer® software
  • Studio 5000® Logix Emulate™ software

Vulnerability Details

CVE-2020-14509: Arbitrary Command Execution Due to Buffer Access with Incorrect Length Value of CodeMeter
The packet parsing mechanism of CodeMeter does not verify its length field values causing it to access memory outside the bounds of the buffer. This may allow an attacker to execute arbitrary commands by sending a specifically crafted packet. This out of bounds memory access could also lead to relevant memory corruption causing denial-of-service conditions by crashing the CodeMeter server

CVSS v3.1 Base Score: 10.0/10 [CRITICAL]
CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2020-14517: Arbitrary Command Execution Due to the Inadequate Encryption Strength of CodeMeter
A vulnerability exists in the encryption scheme of CodeMeter, which allows a bypass of the protection mechanism, enabling the server to accept external connections without authentication. This may allow an attacker to remotely communicate with the CodeMeter API, access and modify application data.

CVSS v3.1 Base Score: 9.4/10 [CRITICAL]
CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H)

CVE-2019-14519: Denial-of-Service Conditions Due to the Origin Validation Errors of CodeMeter
The API of the WebSocket internals of CodeMeter does not provide authentication on its WebSocket services. This may allow an attacker to cause denial-of-service conditions by sending a specifically crafted JavaScript payload allowing alteration or creation of license files.

CVSS v3.1 Base Score: 8.1/10 [HIGH]
CVSS Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H

CVE-2020-16233: Denial-of-Service Conditions Due to the Improper Resource Release of CodeMeter
A vulnerability exists in the internal program resource management of CodeMetermanagement, which allows the disclosure of heap memory. This may allow an attacker to cause denial-of-service conditions by triggering an intentional resource leak.

CVSS v3.1 Base Score: 7.5/10 [HIGH]
CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

CVE-2020-14513: Denial-of-Service Conditions Due to Improper Input Validation of CodeMeter
A vulnerability exists in the input validation method of CodeMeter that can affect its program control flow or data flow. This may allow an attacker to alter the control flow and cause denial-of-service conditions to CodeMeter and any product dependencies by using a specifically crafted license file.

CVSS v3.1 Base Score: 7.5 [HIGH]
CVSS Vector: AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

CVE-2020-14515: Denial-of-Service Condition or Data Modification due to Improper Verification of a Cryptographic Signature in CodeMeter
A vulnerability exists in the license-file signature checking mechanism, which may allow an attacker to build arbitrary license files including forging a valid license file as if it were a valid license file of an existing vendor. This may allow an attacker to modify data or could cause a denial-of-service condition to CodeMeter.

CVSS v3.1 Base Score: 7.4/10 [HIGH]
CVSS v3.1 Vector: AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:H

Risk Mitigation & User Action

UPDATE (4.0)
Customers using the affected versions of FactoryTalk Activation Manager are encouraged to update to v4.05.01. This version of FactoryTalk Activation Manager contains CodeMeter 7.10a, which addresses the vulnerabilities. Customers who are unable to patch are directed towards risk mitigation strategies provided below, and are encouraged, when possible, to combine these with the general security guidelines to employ multiple strategies simultaneously.
Vulnerability Currently Installed Suggested Actions
CVE-2020-14517
CVE-2020-16233
CVE-2020-14513
CVE-2020-14509
CVE-2020-14519
CVE-2020-14515

FactoryTalk Activation Manager v4.05.00 and earlier Update to version 4.05.01 of FactoryTalk Activation Manager. Select the FactoryTalk Activation Manager download from our website.

This information can also be found in Compatibility & Downloads > Configured Views > Standard Views > Software Latest Versions > FactoryTalk Activation.

UPDATE (3.0)
Customers using the affected products are encouraged to update to an available software revision that addresses the associated risk. As of September 16, 2020, CodeMeter 7.10a is compatible with FactoryTalk Activation Manager via the Rockwell Automation Product Compatibility and Download Center (PCDC). This version of CodeMeter remediates all of the vulnerabilities noted below. Customers can update CodeMeter directly from Wibu, which is compatible with all supported versions of FTA. A bundled version of CodeMeter 7.10a and FactoryTalk Activation Manager will also release in the coming days.

Customers who are unable to update are directed towards risk mitigation strategies provided below, and are encouraged, when possible, to combine these with the general security guidelines to employ multiple strategies simultaneously.

Vulnerability Currently Installed Suggested Actions
CVE-2020-14517
CVE-2020-16233
CVE-2020-14513
CVE-2020-14509
CVE-2020-14519
CVE-2020-14515

FactoryTalk Activation Manager v4.05.00 and earlier Update to version 7.10a of CodeMeter found on the Rockwell Automation PCDC, which is compatible with all supported versions of FTA.

This information can also be found in Compatibility & Downloads > Configured Views > Standard Views > Software Latest Versions > FactoryTalk Activation.

Previous Information Contained in Versions 1.0-2.1
Customers using the affected products are encouraged to update to an available software revision that addresses the associated risk for CVE-2019-14519, and CVE-2020-14515. Customers who are unable to update are directed towards risk mitigation strategies provided below, and are encouraged, when possible, to combine these with the general security guidelines to employ multiple strategies simultaneously.

For CVE-2020-14517, CVE-2020-16233, and CVE-2020-14513, FTA v4.05 or later mitigates these vulnerabilities unless CodeMeter is running as a server. Rockwell Automation is working to address these vulnerabilities and will continue to provide updates as these fixes become available.

Vulnerability Currently Installed Suggested Actions
CVE-2020-14519
CVE-2020-14515
FactoryTalk Activation Manager v4.04.00 and earlier Update to FTA v4.05 or later and employ the general security guidelines.

For compatibility details about FactoryTalk Activation Manager, customers can consult the Product Compatibility and Download Center Standard Views > Software Latest Versions > FactoryTalk Activation
CVE-2020-14517
CVE-2020-16233
CVE-2020-14513
CVE-2020-14509
FactoryTalk Activation Manager v4.04.00 and earlier Update to FTA v4.05 or later and employ the general security guidelines.

The default configuration of FTA v4.05 limits the vulnerable port, which mitigates these vulnerabilities. However, if CodeMeter is running a server, which can be turned on via FTA, customers should ensure they are employing proper network segmentation and security controls. Specifically, network exposure for all control system devices should be minimized, and control systems should be behind firewalls and isolated from other networks when possible. Refer to the Converged Plantwide Ethernet (CPwE) Design and Implementation Guide for best practices deploying network segmentation and broader defense-in-depth strategies.

General Security Guidelines

Network-based Vulnerability Mitigations for Embedded Products
  • Utilize proper network infrastructure controls, such as firewalls, to help ensure that any traffic from unauthorized sources are blocked.
  • Consult the product documentation for specific features, such as a hardware key switch setting, to which may be used to block unauthorized changes, etc.
  • Utilize the new REST API instead of the internal WebSockets API
  • Disable the WebSockets API
General Mitigations
  • Use trusted software, software patches, antivirus/antimalware programs and interact only with trusted web sites and attachments.
  • Locate control system networks and devices behind firewalls and isolate them from the business network.
  • When remote access is required, use secure methods, such as Virtual Private Networks (VPNs), recognizing that VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize that VPN is only as secure as the connected devices.
  • Minimize network exposure for all control system devices and/or systems and ensure that they are not accessible from the Internet. For further information about the risks of unprotected Internet accessible control systems, please see Knowledgebase Article ID PN71
For further information on the Vulnerability Handling Process for Rockwell Automation, please see our Product Security Incident Response FAQ document.

Refer to our Industrial Network Architectures Page for comprehensive information about implementing validated architectures designed to complement security solutions.

See the Network Services Overview Page for information on network and security services for Rockwell Automation to enable assessment, design, implementation and management of validated, secure network architectures.

Rockwell Automation remains committed to making security enhancements to our systems in the future. For more information and for assistance with assessing the state of security of your existing control system, including improving your system-level security when using Rockwell Automation and other vendor controls products, visit the Rockwell Automation Security Solutions website.

Requests for additional information can be sent to the RASecure Inbox (rasecure@ra.rockwell.com).
Please direct all media inquiries to Kolve Byrd (KAByrd@ra.rockwell.com).


ADDITIONAL LINKS
  • PN1354 - Industrial Security Advisory Index.
  • Industrial Firewalls within a CPwE Architecture
  • Deploying Industrial Firewalls within a CPwE Architecture Design and Implementation Guide

Rockwell Automation Home
Copyright ©2022 Rockwell Automation, Inc.
  1. Chevron LeftChevron Left Rockwell Automation 主页 Chevron RightChevron Right
  2. Chevron LeftChevron Left Trust Center Chevron RightChevron Right
  3. Chevron LeftChevron Left Industrial Security Adv Chevron RightChevron Right
  4. Chevron LeftChevron Left Industrial Security Advisory Detail Chevron RightChevron Right
公司
关于我们 工作机会 多元化、道德与完整性 Engage Online Community 投资者关系 可持续性 信托中心
新闻和活动
新闻发布室 新闻稿 Automation Fair 事件
 
趋势图主题
网络安全 数字化转型 智能制造 The Connected Enterprise®
培训
网络研讨会 培训
 
PartnerNetwork
查找合作伙伴 PartnerNetwork 是什么?
 
我们的品牌
Allen-Bradley FactoryTalk LifecycleIQ 服务
联系我们
TechConnect 支持 客户服务中心 一般问题 如何购买 报告道德问题
洞察力
ROKStudios 自动化前沿 博客 案例研究 播客
BlogRockwell Automation's Blog
CN | ZH
法律声明
隐私与 Cookie 策略
电子邮件首选项
Cookie 首选项
可访问性首选项
© 2025 Rockwell Automation
Rockwell Automation 主页
请更新您的Cookies偏好以继续.
此功能需要Cookies来增强您的体验。请更新您的系统偏好以允许使用这些Cookies:
  • 社交媒体Cookies
  • 功能Cookies
  • 性能 Cookies
  • 市场营销Cookies
  • 所有Cookies
您可以随时更新您的系统偏好。如需了解更多信息,请参阅我们的 隐私政策
CloseClose