Back to overview

Pilz: Vulnerability affecting PASvisu Runtime

VDE-2025-093
Last update
10/20/2025 12:00
Published at
10/20/2025 12:00
Vendor(s)
Pilz GmbH & Co. KG
External ID
PPSA-2025-004
CSAF Document

Summary

The PASvisu Runtime is affected by a vulnerability in a third-party component which can be exploited by a malicious web request.

Impact

A successful attack leads to a loss of availability of the affected Pilz products. For the products to be operational again, a manual restart is required.

Affected Product(s)

Model no. Product name Affected versions
Firmware PMI v70Xe <=03.00.00 installed on PMIv7xxe PASvisu <=1.15.0
Firmware PMI v8 <=2.2.1 installed on PMIv8xx PASvisu <=1.15.0
PASvisu <=1.15.0 PASvisu <=1.15.0

Vulnerabilities

Expand / Collapse all

Published
10/22/2025 09:13
Weakness
Integer Overflow or Wraparound (CWE-190)
Summary

An integer overflow vulnerability exists in the WebSocket component of Mongoose 7.5 thru 7.17. By sending a specially crafted WebSocket request, an attacker can cause the application to crash. If downstream vendors integrate this component improperly, the issue may lead to a buffer overflow.

References

Mitigation

Limit network access to PASvisu server by using a firewall, a host-based firewall or similar measures.

Remediation

  • PASvisu: Please visit the Pilz website (https://www.pilz.com/en-INT/search) and install the new version 'PASvisu 1.15.1' on to your device.

  • PMIv7xxe: Please visit the Pilz website (https://www.pilz.com/en-INT/search) and install the new firmware image 'Firmware PMI v70Xe (visu 1.15.1) 03.01.00' on to your device.

  • PMIv8xx: Please visit the Pilz website (https://www.pilz.com/en-INT/search) and download 'Firmware PMI v8 Assistant (visu 1.15.1) 2.2.2' in order to install the new verison of the firmware on to your device. ;

Acknowledgments

Pilz GmbH & Co. KG thanks the following parties for their efforts:

Revision History

Version Date Summary
1.0.0 10/20/2025 12:00 Initial Version