Pilz: Multiple products affected by uC/HTTP vulnerability
The PITreader product family uses the uC/HTTP third-party component for web server functionality. uC/HTTP is affected by multiple vulnerabilities (CWE-787: Out-of-bounds Write) that allow an attacker to gain full control over the system. Affected products include: PIT gb RLLE y down ETH (versions before 02.02.00), PIT gb RLLE y up ETH (versions before 02.02.00), PITreader base unit HR 01 (versions before 01.05.04), PITreader base unit HR 02 (versions before 02.02.00), PITreader card unit (versions before 02.02.00), PITreader S base unit (versions before 02.02.00), and PITreader S card unit (versions before 02.02.00).
- Network access to the web server port on the PITreader device (typically port 80 or 443)
- No authentication required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/888f65b3-646e-4359-89ed-1aa20427ff4cGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.