Skip to main content

CVE-2022-40976: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in PILZ PAScal

Medium
Published: Thu Nov 24 2022 (11/24/2022, 09:19:54 UTC)
Source: CVE
Vendor/Project: PILZ
Product: PAScal

Description

A path traversal vulnerability was discovered in multiple Pilz products. An unauthenticated local attacker could use a zipped, malicious configuration file to trigger arbitrary file writes ('zip-slip'). File writes do not affect confidentiality or availability.

AI-Powered Analysis

AILast updated: 06/24/2025, 14:52:54 UTC

Technical Analysis

CVE-2022-40976 is a path traversal vulnerability (CWE-22) identified in the PILZ PAScal product, specifically version 1.0.0. The vulnerability arises from improper limitation of pathnames when processing zipped configuration files. An unauthenticated local attacker can exploit this flaw by crafting a malicious zipped configuration file containing specially crafted file paths that traverse directories outside the intended extraction directory. This technique, commonly known as a 'zip-slip' attack, allows the attacker to write arbitrary files to locations on the filesystem where the application has write permissions. Despite the ability to write arbitrary files, the vulnerability does not impact confidentiality or availability, indicating that the attacker cannot read sensitive data or cause denial of service directly through this exploit. The attack requires local access to the system, meaning the attacker must have some level of access to the host environment to deliver the malicious archive. There are no known exploits in the wild, and no patches have been published as of the date of this analysis. The vulnerability was assigned by CERTVDE and is recognized by CISA, indicating its relevance to critical infrastructure and industrial control systems, given PILZ's focus on automation and safety products. The lack of authentication requirement for the file processing step combined with the local access prerequisite defines the attack vector and limits the scope of exploitation to local users or processes capable of delivering the malicious archive to the PAScal software environment.

Potential Impact

For European organizations, especially those involved in industrial automation, manufacturing, and safety-critical systems where PILZ PAScal is deployed, this vulnerability poses a risk of unauthorized file writes on affected systems. While confidentiality and availability are not directly compromised, the ability to write arbitrary files could be leveraged for persistence, privilege escalation, or to introduce malicious code or configuration changes that may indirectly affect system integrity and operational safety. This is particularly concerning in industrial environments where system integrity is paramount to prevent unsafe conditions or production disruptions. The local access requirement limits remote exploitation but insider threats or compromised local accounts could exploit this vulnerability. The absence of known exploits reduces immediate risk, but the potential for targeted attacks in industrial settings remains. European organizations relying on PILZ PAScal for automation safety functions should consider the risk of manipulation of configuration files that could alter system behavior or safety logic, potentially leading to operational hazards or regulatory non-compliance.

Mitigation Recommendations

1. Restrict local access to systems running PILZ PAScal to trusted personnel only, implementing strict access controls and monitoring for unauthorized local activity. 2. Implement file integrity monitoring on directories where PAScal configuration files are stored or extracted to detect unauthorized file writes or modifications. 3. Use application whitelisting to prevent execution or loading of unauthorized files that could be introduced via the zip-slip exploit. 4. Isolate PAScal systems within segmented network zones to limit lateral movement in case of local compromise. 5. Regularly audit and validate configuration files for integrity and authenticity before deployment. 6. Engage with PILZ for updates or patches and apply them promptly once available. 7. Employ endpoint detection and response (EDR) solutions to detect suspicious file operations or exploitation attempts locally. 8. Educate local users and administrators on the risks of processing untrusted zipped configuration files and enforce policies to avoid using files from unverified sources.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
CERTVDE
Date Reserved
2022-09-19T14:13:38.097Z
Cisa Enriched
true

Threat ID: 682d983ec4522896dcbf003b

Added to database: 5/21/2025, 9:09:18 AM

Last enriched: 6/24/2025, 2:52:54 PM

Last updated: 7/31/2025, 3:37:12 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats