Pilz: Authentication Bypass in IndustrialPI Webstatus
The Pilz IndustrialPI 4 webstatus web application (versions below 2.4.6) contains an authentication bypass vulnerability that allows unauthenticated network access to the management interface. The webstatus application is responsible for monitoring and configuring industrial processes and is commonly integrated with PLCs and automated systems. An attacker can gain unauthorized access to this interface without credentials, potentially allowing manipulation of process setpoints, operational data, and system configuration. The vulnerability exists in CWE-704 (incorrect type conversion or cast) and carries a CVSS score of 9.8 (critical).
- Network access to the IndustrialPI webstatus web interface (typically port 80 or 443)
- IndustrialPI version 4 below 2.4.6
Patching may require device reboot — plan for process interruption
/api/v1/advisories/b5096630-4c1a-44e8-9ade-0afd89f8db07Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.