Zurück zur Übersicht

Pepperl+Fuchs: Vulnerability allowing code-excution in PACTware <=5.0.5.31

VDE-2021-001
Last update
14.05.2025 14:28
Published at
15.01.2021 13:41
Vendor(s)
Pepperl+Fuchs SE
External ID
VDE-2021-001
CSAF Document

Summary

A critical vulnerability has been discovered in the fdtCONTAINER component by M&M Software GmbH used by PACTware.
While de-serializing PACTware 5 project files (loading PW5 files) the vulnerability can be exploited to execute arbitrary code.

Impact

An attacker might be able to exploit the vulnerability on the workstation running PACTware 5 by supplying/providing a manipulated project file. If that project file is loaded, malicious code can be executed without notice.

For more information see:

VDE-2020-048: M&M Software (WAGO): Deserialisation of untrusted data in fdtContainer

Affected Product(s)

Model no. Product name Affected versions
Software PACTware 5.0 <=5.0.5.31 Software PACTware 5.0 <=5.0.5.31

Vulnerabilities

Expand / Collapse all

Published
22.09.2025 14:57
Weakness
Deserialization of Untrusted Data (CWE-502)
Summary

M&M Software fdtCONTAINER Component in versions below 3.5.20304.x and between 3.6 and 3.6.20304.x is vulnerable to deserialization of untrusted data in its project storage.

References

Mitigation

Exchange project data only via secure exchange services
Use appropriate means to protect the project storage from unauthorized
manipulation
Do not open project data from an unknown source
Reduce the user rights of the host application to the necessary minimum

Remediation

A fix for the issue will be provided with PACTware 6 in Q2 2021 which includes the proposed solution by M&M based on FDT Container component version >= 3.6.20304.x.

Revision History

Version Date Summary
1 15.01.2021 13:41 Initial revision.
2 14.05.2025 14:28 Fix: version space, added distribution