Vulnerability Description
A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Pilz | Pas 4000 | < 1.25.0 |
| Pilz | Pss 4000 | - |
| Pliz | Pascal | <= 1.9.1 |
| Pliz | Pasconnect | < 1.4.0 |
| Pliz | Pasmotion | < 1.4.1 |
| Pliz | Pnozmulti Configurator | < 10.14.4 |
Related Weaknesses (CWE)
References
- https://cert.vde.com/en/advisories/VDE-2022-044/Vendor Advisory
- https://cert.vde.com/en/advisories/VDE-2022-045/Vendor Advisory
- https://cert.vde.com/en/advisories/VDE-2022-044/Vendor Advisory
- https://cert.vde.com/en/advisories/VDE-2022-045/Vendor Advisory
FAQ
What is CVE-2022-40976?
CVE-2022-40976 is a vulnerability with a CVSS score of 5.5 (MEDIUM). A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'...
How severe is CVE-2022-40976?
CVE-2022-40976 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-40976?
Check the references section above for vendor advisories and patch information. Affected products include: Pilz Pas 4000, Pilz Pss 4000, Pliz Pascal, Pliz Pasconnect, Pliz Pasmotion.