Zurück zur Übersicht

Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

VDE-2026-006
Last update
02.02.2026 11:00
Published at
02.02.2026 09:00
Vendor(s)
Pilz GmbH & Co. KG
External ID
PPSA-2026-001
CSAF Document

Summary

PIT User Authentication Service is part of the operating mode selection and access permission system PITmode. The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.

Impact

The attacker can intercept the communication between the PITreader and the PIT User Authentication Service which can lead to disclosure of the PITreader API token. Furthermore the PIT User Authentication Service is vulnerable to a Denial of Service attack.

Affected Product(s)

Model no. Product name Affected versions
PIT User Authentication Service 1.4.0, vers:generic/<1.4.1

Vulnerabilities

Expand / Collapse all

Published
09.02.2026 08:38
Weakness
Incomplete Cleanup (CWE-459)
Summary

Improper Input Validation vulnerability in Apache Tomcat. Incorrect error handling for some invalid HTTP priority headers resulted in incomplete clean-up of the failed request which created a memory leak. A large number of such requests could trigger an OutOfMemoryException resulting in a denial of service. This issue affects Apache Tomcat: from 9.0.76 through 9.0.102, from 10.1.10 through 10.1.39, from 11.0.0-M2 through 11.0.5. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.90 though 8.5.100. Users are recommended to upgrade to version 9.0.104, 10.1.40 or 11.0.6 which fix the issue.

References

Published
09.02.2026 08:38
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
Summary

Allocation of Resources Without Limits or Throttling vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue.

References

Published
09.02.2026 08:38
Weakness
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362)
Summary

In Eclipse Jersey versions 2.45, 3.0.16, 3.1.9 a race condition can cause ignoring of critical SSL configurations - such as mutual authentication, custom key/trust stores, and other security settings. This issue may result in SSLHandshakeException under normal circumstances, but under certain conditions, it could lead to unauthorized trust in insecure servers (see PoC)

References

Published
09.02.2026 08:38
Weakness
Improper Resource Shutdown or Release (CWE-404)
Summary

Improper Resource Shutdown or Release vulnerability in Apache Tomcat. If an error occurred (including exceeding limits) during the processing of a multipart upload, temporary copies of the uploaded parts written to disc were not cleaned up immediately but left for the garbage collection process to delete. Depending on JVM settings, application memory usage and application load, it was possible that space for the temporary copies of uploaded parts would be filled faster than GC cleared it, leading to a DoS. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.11, from 10.1.0-M1 through 10.1.46, from 9.0.0.M1 through 9.0.109. The following versions were EOL at the time the CVE was created but are known to be affected: 8.5.0 though 8.5.100. Other, older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.12 or later, 10.1.47 or later or 9.0.110 or later which fixes the issue.

References

Mitigation

Limit network access to the PITreader and PIT User Authentication Service by using a firewall, a host-based firewall or similar measures.

Remediation

Please visit the Pilz website (https://www.pilz.com/en-INT/search) and install the new version "Software PIT User Auth. Service 1.4.1" on to your device.

Acknowledgments

Pilz GmbH & Co. KG thanks the following parties for their efforts:

Revision History

Version Date Summary
1.0.0 02.02.2026 09:00 Initial Version
1.0.1 02.02.2026 11:00 Summary has been updated.