Summary
Authentication is not configured by default for the Node-RED server on the Pilz industrial PC IndustrialPI. An unauthenticated remote attacker has full access to the Node-RED server and can run arbitrary operating system commands on the underlying operating system with privileged rights.
Impact
The attacker can not only view but create and alter flows in Node-RED. Flows can contain code blocks where commands are executed on the IndustrialPI itself. An attacker can use these code blocks to run any command as a privileged user on the IndustrialPI.
Affected Product(s)
Model no. | Product name | Affected versions |
---|---|---|
A1000002, A1000003 | IndustrialPI 4 | Firmware Bullseye <=2024-08 |
Vulnerabilities
Expand / Collapse allMitigation
Limit network access to the IndustrialPI by using a firewall or similar measures.
Remediation
Consult our PDF with remediations which you can find under [www.pilz.com/search. In order to activate the authentication as described in the PDF, you have to have the Node-RED service enabled via the web application.
Revision History
Version | Date | Summary |
---|---|---|
1.0.0 | 07/01/2025 12:00 | Initial Version |