Pilz: Multiple products affected by ZipSlip
Multiple Pilz software products do not properly validate file paths contained in ZIP archives. An attacker can exploit this ZipSlip vulnerability to write arbitrary files to the system, potentially achieving code execution or unauthorized modification of safety configurations. Affected products: PAScal, PASconnect, PASmotion, PNOZmulti Configurator (both standard and LTS versions). The vulnerability requires user interaction—a victim must open or import a malicious archive—but does not require authentication or special privileges.
- User interaction: victim must open or import a malicious ZIP archive in the affected Pilz software
- Local file system access to the machine running the Pilz software
- No special privileges or valid credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/2c2427a1-7e60-4353-a391-747151877745Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.