Pilz: Vulnerability affecting PASvisu Runtime
Plan PatchCVSS 7.5PPSA-2025-004Oct 20, 2025
Pilz
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary
PASvisu Runtime contains a vulnerability in a third-party web component (CWE-190: Integer Overflow) that can be exploited via a malicious web request to cause denial of service. The affected versions are PASvisu <=1.15.0, PMIv7xxe <=1.15.0, and PMIv8xx <=1.15.0. The vulnerability allows an attacker to crash the PASvisu server, making the safety visualization interface unavailable to operators.
What this means
What could happen
An attacker could send a malicious web request to the PASvisu server, causing it to stop responding and deny service to operators who rely on the visualization interface to monitor and control plant safety systems.
Who's at risk
Safety system operators and plant engineers who use Pilz PASvisu for visualization and monitoring of safety-critical control logic. Affected installations include those running PMIv7xxe or PMIv8xx industrial panels with PASvisu versions 1.15.0 and earlier.
How it could be exploited
An attacker with network access to the PASvisu server (port 80/443 or similar) sends a crafted HTTP/HTTPS request that triggers an integer overflow in a third-party web component, causing the server to crash and become unavailable.
Prerequisites
- Network connectivity to the PASvisu server web interface
- No authentication required for the malicious request
remotely exploitableno authentication requiredlow complexityaffects safety systemsdenial of service impact
Exploitability
Unlikely to be exploited — EPSS score 0.3%
Public Proof-of-Concept (PoC) on GitHub (1 repository)
Affected products (3)
3 with fix
ProductAffected VersionsFix Status
PMIv7xxe≤ 1.15.01.15.1
PMIv8xx≤ 1.15.01.15.1
PASvisu <=1.15.0≤ 1.15.01.15.1
Remediation & Mitigation
0/4
Do now
0/1WORKAROUNDImplement firewall rules to restrict network access to the PASvisu server to only authorized workstations and HMI devices
Schedule — requires maintenance window
0/3Patching may require device reboot — plan for process interruption
PMIv7xxe
HOTFIXUpdate PMIv7xxe firmware to version 1.15.1 or later (Firmware PMI v70Xe (visu 1.15.1) 03.01.00)
PMIv8xx
HOTFIXUpdate PMIv8xx firmware using the new assistant (Firmware PMI v8 Assistant (visu 1.15.1) 2.2.2)
All products
HOTFIXUpdate PASvisu to version 1.15.1 or later
CVEs (1)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/f624bba2-78d4-4a99-b3e1-0d84d7cbd642Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.