Back to overview

Pilz: Multiple Vulnerabilities affecting the PIT User Authentication Service

VDE-2026-006
Last update
02/02/2026 11:00
Published at
02/02/2026 09:00
Vendor(s)
Pilz GmbH & Co. KG
External ID
PPSA-2026-001
CSAF Document

Summary

PIT User Authentication Service is part of the operating mode selection and access permission system PITmode. The PIT User Authentication Service is affected by multiple vulnerabilities in included third-party components.

Impact

The attacker can intercept the communication between the PITreader and the PIT User Authentication Service which can lead to disclosure of the PITreader API token. Furthermore the PIT User Authentication Service is vulnerable to a Denial of Service attack.

Affected Product(s)

Model no. Product name Affected versions
PIT User Authentication Service 1.4.0 PIT User Authentication Service 1.4.0
PIT User Authentication Service <1.4.1 PIT User Authentication Service <1.4.1

Vulnerabilities

Expand / Collapse all

Published
02/02/2026 11:16
Weakness
Incomplete Cleanup (CWE-459)
References

Published
02/02/2026 11:16
Weakness
Allocation of Resources Without Limits or Throttling (CWE-770)
References

Published
02/02/2026 11:16
Weakness
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') (CWE-362)
References

Published
02/02/2026 11:16
Weakness
Improper Resource Shutdown or Release (CWE-404)
References

Mitigation

Limit network access to the PITreader and PIT User Authentication Service by using a firewall, a host-based firewall or similar measures.

Remediation

Please visit the Pilz website (https://www.pilz.com/en-INT/search) and install the new version "Software PIT User Auth. Service 1.4.1" on to your device.

Acknowledgments

Pilz GmbH & Co. KG thanks the following parties for their efforts:

Revision History

Version Date Summary
1.0.0 02/02/2026 09:00 Initial Version
1.0.1 02/02/2026 11:00 Summary has been updated.