Back
WIBU-SYSTEMS AG
Patches for WibuKey x86
Windows
3 patches available
WibuKey allows you to use one and the same type of hardware for the protection of your single station licenses as well as your floating licenses within one
WibuKey x86 Version 6.71.7124.500
Release Date
11/10/2025
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
WibuKey 6.71$$$Release Date$$$2025-Nov-10$$$Operating Systems$$$Windows$$$Information$$$Fix of reported vulnerabilities according to CVE standard (Common Vulnerabilities and$$$Exposures)$$$• A dereference of an untrusted pointer in the WibuKey2_64.sys kernel driver for 64-$$$bit Windows allows an attacker to abuse a write-what-where primitive; enabling$$$local privilege escalation. An adversary could use this to execute arbitrary code; run$$$an administrator shell; or take complete control of the system (CVE-0000-00000)$$$(WIBU-100031).$$$• Improper validation of memory boundaries in WibuKey64.sys of WibuKey for$$$Windows could allow an attacker to set pointers outside the program’s valid address$$$space. While this typically leads to a denial-of-service; the possibility of exploits$$$enabling Remote Code Execution or Privilege Escalation cannot be excluded (CVE0000-00000) (WIBU-100057).$$$Bugfixes:$$$WkRt-100024: WibuKey Runtime Installer: Windows: After uninstalling WibuKey Runtime;$$$not all files were deleted in certain configurations. This behavior has been fixed.
WibuKey x86 Version 6.70.6536.500
Release Date
9/6/2024
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
WibuKey 6.70$$$Release Date$$$2024-Sep-06$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$WibuKey for Windows: Fix of reported vulnerabilities according to CVE standard (Common$$$Vulnerabilities and Exposures)$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause arbitrary address writes; resulting in kernel memory$$$corruption (CVE-2024-45181) (WkRt-94453).$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause an arbitrary address read; which could result in$$$denial of service (CVE-2024-45182) (WkRt-94453).$$$Feature:$$$WkRt-80732: WibuKey Runtime: The Apple M1 chip is now fully supported natively. This$$$means that the Rosetta 2 emulation package is no longer required on systems with an$$$Apple M1 chip.$$$WkRt-71586: WibuKey Runtime: The OpenSource document for WibuKey is now$$$integrated into the user help and therefore directly available on all installations.$$$Bugfixes:$$$WkRt-100003: WibuKey Runtime: Setup: The setup under Windows contained an old *.cat$$$file; which in rare individual cases impeded the installation.$$$WkRt-96433: WibuKey Runtime: Setup: The WibuKey.dll could not be registered correctly$$$on 32-bit operating systems.$$$WkRt-79699: Server + WebMonitor: macOS: Starting and stopping the WibuKey server$$$using the provided StartServer and StopServer commands did not work reliably.$$$WkRt-88321: Misc: The installed language files were not signed.
WibuKey x86 Version 6.70.6536.500
Release Date
9/6/2024
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
WibuKey 6.70$$$Release Date$$$2024-Sep-06$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$WibuKey for Windows: Fix of reported vulnerabilities according to CVE standard (Common$$$Vulnerabilities and Exposures)$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause arbitrary address writes; resulting in kernel memory$$$corruption (CVE-2024-45181) (WkRt-94453).$$$• An improper buffer bounds check in WibuKey32.sys and WibuKey64.sys allows$$$specially crafted calls to cause an arbitrary address read; which could result in$$$denial of service (CVE-2024-45182) (WkRt-94453).$$$Feature:$$$WkRt-80732: WibuKey Runtime: The Apple M1 chip is now fully supported natively. This$$$means that the Rosetta 2 emulation package is no longer required on systems with an$$$Apple M1 chip.$$$WkRt-71586: WibuKey Runtime: The OpenSource document for WibuKey is now$$$integrated into the user help and therefore directly available on all installations.$$$Bugfixes:$$$WkRt-100003: WibuKey Runtime: Setup: The setup under Windows contained an old *.cat$$$file; which in rare individual cases impeded the installation.$$$WkRt-96433: WibuKey Runtime: Setup: The WibuKey.dll could not be registered correctly$$$on 32-bit operating systems.$$$WkRt-79699: Server + WebMonitor: macOS: Starting and stopping the WibuKey server$$$using the provided StartServer and StopServer commands did not work reliably.$$$WkRt-88321: Misc: The installed language files were not signed.
WibuKey x86 Version 6.60.4820.500
Release Date
10/1/2021
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
WibuKey 6.60$$$Release Date$$$2021-Oct-01$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$? Windows 11 is supported.$$$Fix of reported vulnerabilities according to CVE standard (Common Vulnerabilities and$$$Exposures)$$$? Update of jQuery library to fix various vulnerabilities (CVE-2020-11023; CVE-2020-$$$11022; CVE-2019-11358; CVE-2015-9251) of Medium category. The library is used$$$in WibuKey user help (FB78826).$$$? Removal of the user interface for WibuKey Server to avoid recurring vulnerabilities$$$in a used library (QT) now and in the future. The specific reason is the vulnerability$$$CVE-2017-12652; which is classified as Critical 9.8; but in the use case in WibuKey$$$was classified by Wibu-Systems CERT as Medium 6.5 (FB65083).$$$Features:$$$FB73816: WibuKey Runtime: Windows: The WibuKey Server service can now be started$$$by users independently of the User Account Control (UAC).$$$Bugfixes:$$$FB71481: WibuKey: Installer: macOS: The installer encountered problems related to the$$$Dark Mode setting.$$$FB62288: WkSvMon: Windows: On servers with several network interfaces the server list$$$could contain the same entry multiple times.$$$FB35225: WibuKey Runtime: Problems occurred during internal error handling.$$$FB48745: WibuKey Runtime: WibuKey Control Panel: The WibuKey Control Panel$$$eventually crashed when creating a report in some environments.$$$FB47467: WibuKey Runtime: WibuKey Control Panel: When resetting the Plug&Play$$$settings; an empty dialog appeared.$$$FB73206: WibuKey Runtime: When calling WkbAccess2() with flag WKB_ACC_WKNET$$$set; WkWin64.dll crashed.
WibuKey x86 Version 6.60.4820.500
Release Date
10/1/2021
Bug Fix?
Yes
Minor Release?
Yes
Patch Notes
WibuKey 6.60$$$Release Date$$$2021-Oct-01$$$Operating Systems$$$Windows; macOS; Linux$$$Information$$$? Windows 11 is supported.$$$Fix of reported vulnerabilities according to CVE standard (Common Vulnerabilities and$$$Exposures)$$$? Update of jQuery library to fix various vulnerabilities (CVE-2020-11023; CVE-2020-$$$11022; CVE-2019-11358; CVE-2015-9251) of Medium category. The library is used$$$in WibuKey user help (FB78826).$$$? Removal of the user interface for WibuKey Server to avoid recurring vulnerabilities$$$in a used library (QT) now and in the future. The specific reason is the vulnerability$$$CVE-2017-12652; which is classified as Critical 9.8; but in the use case in WibuKey$$$was classified by Wibu-Systems CERT as Medium 6.5 (FB65083).$$$Features:$$$FB73816: WibuKey Runtime: Windows: The WibuKey Server service can now be started$$$by users independently of the User Account Control (UAC).$$$Bugfixes:$$$FB71481: WibuKey: Installer: macOS: The installer encountered problems related to the$$$Dark Mode setting.$$$FB62288: WkSvMon: Windows: On servers with several network interfaces the server list$$$could contain the same entry multiple times.$$$FB35225: WibuKey Runtime: Problems occurred during internal error handling.$$$FB48745: WibuKey Runtime: WibuKey Control Panel: The WibuKey Control Panel$$$eventually crashed when creating a report in some environments.$$$FB47467: WibuKey Runtime: WibuKey Control Panel: When resetting the Plug&Play$$$settings; an empty dialog appeared.$$$FB73206: WibuKey Runtime: When calling WkbAccess2() with flag WKB_ACC_WKNET$$$set; WkWin64.dll crashed.
Interested in automating patching for WibuKey x86?