SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-32760 | SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity. |
Solution
SUBNET Solutions has fixed these issues by enabling a file integrity check on uploaded images and anti-forgery tokens to prevent replay attacks. The fix was introduced in PowerSYSTEM Center update 12 as well as Update 8+Hotfix (both identified by release number 5.12.2305.10101, which can be located in Settings / Overview / Version).
Workaround
SUBNET Solutions recommends users to follow the following workarounds: * Users should verify that SVG files do not contain HTML elements or scripts and validate that JPG and PNG files are not SVG files. * Users should verify network security rules to ensure that outbound connections to the internet are not possible. * If the above cannot be performed or notifications are not required, disable email notifications for reports from PowerSYSTEM Center. * Monitor user activity and ensure application control rules only allow preauthorized executables to run. * Deny users to run other executables on client access servers (PowerSYSTEM Center front end access point).
Mon, 09 Dec 2024 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2024-12-09T20:49:14.599Z
Reserved: 2023-05-25T16:04:56.578Z
Link: CVE-2023-29158

Updated: 2024-08-02T14:00:15.368Z

Status : Modified
Published: 2023-06-19T21:15:42.033
Modified: 2024-11-21T07:56:38.070
Link: CVE-2023-29158

No data.

No data.