Pilz: Vulnerability affecting PASvisu Runtime

Plan PatchCVSS 7.5PPSA-2025-004Oct 20, 2025
Pilz
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

PASvisu Runtime contains a vulnerability in a third-party web component (CWE-190: Integer Overflow) that can be exploited via a malicious web request to cause denial of service. The affected versions are PASvisu <=1.15.0, PMIv7xxe <=1.15.0, and PMIv8xx <=1.15.0. The vulnerability allows an attacker to crash the PASvisu server, making the safety visualization interface unavailable to operators.

What this means
What could happen
An attacker could send a malicious web request to the PASvisu server, causing it to stop responding and deny service to operators who rely on the visualization interface to monitor and control plant safety systems.
Who's at risk
Safety system operators and plant engineers who use Pilz PASvisu for visualization and monitoring of safety-critical control logic. Affected installations include those running PMIv7xxe or PMIv8xx industrial panels with PASvisu versions 1.15.0 and earlier.
How it could be exploited
An attacker with network access to the PASvisu server (port 80/443 or similar) sends a crafted HTTP/HTTPS request that triggers an integer overflow in a third-party web component, causing the server to crash and become unavailable.
Prerequisites
  • Network connectivity to the PASvisu server web interface
  • No authentication required for the malicious request
remotely exploitableno authentication requiredlow complexityaffects safety systemsdenial of service impact
Exploitability
Unlikely to be exploited — EPSS score 0.3%
Public Proof-of-Concept (PoC) on GitHub (1 repository)
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
PMIv7xxe≤ 1.15.01.15.1
PMIv8xx≤ 1.15.01.15.1
PASvisu <=1.15.0≤ 1.15.01.15.1
Remediation & Mitigation
0/4
Do now
0/1
WORKAROUNDImplement firewall rules to restrict network access to the PASvisu server to only authorized workstations and HMI devices
Schedule — requires maintenance window
0/3

Patching may require device reboot — plan for process interruption

PMIv7xxe
HOTFIXUpdate PMIv7xxe firmware to version 1.15.1 or later (Firmware PMI v70Xe (visu 1.15.1) 03.01.00)
PMIv8xx
HOTFIXUpdate PMIv8xx firmware using the new assistant (Firmware PMI v8 Assistant (visu 1.15.1) 2.2.2)
All products
HOTFIXUpdate PASvisu to version 1.15.1 or later
API: /api/v1/advisories/f624bba2-78d4-4a99-b3e1-0d84d7cbd642

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

Pilz: Vulnerability affecting PASvisu Runtime | CVSS 7.5 - OTPulse