Description



SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.






Published: 2023-06-19
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

SUBNET Solutions has fixed these issues by enabling a file integrity check on uploaded images and anti-forgery tokens to prevent replay attacks. The fix was introduced in PowerSYSTEM Center update 12 as well as Update 8+Hotfix (both identified by release number 5.12.2305.10101, which can be located in Settings / Overview / Version).


Vendor Workaround

SUBNET Solutions recommends users to follow the following workarounds: * Users should verify that SVG files do not contain HTML elements or scripts and validate that JPG and PNG files are not SVG files. * Users should verify network security rules to ensure that outbound connections to the internet are not possible. * If the above cannot be performed or notifications are not required, disable email notifications for reports from PowerSYSTEM Center. * Monitor user activity and ensure application control rules only allow preauthorized executables to run. * Deny users to run other executables on client access servers (PowerSYSTEM Center front end access point).

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-32760 SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.
History

Mon, 09 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Subnet Powersystem Center
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-12-09T20:49:14.599Z

Reserved: 2023-05-25T16:04:56.578Z

Link: CVE-2023-29158

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:15.368Z

cve-icon NVD

Status : Modified

Published: 2023-06-19T21:15:42.033

Modified: 2024-11-21T07:56:38.070

Link: CVE-2023-29158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses