SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.






Advisories
Source ID Title
EUVD EUVD EUVD-2023-32760 SUBNET PowerSYSTEM Center versions 2020 U10 and prior are vulnerable to replay attacks which may result in a denial-of-service condition or a loss of data integrity.
Fixes

Solution

SUBNET Solutions has fixed these issues by enabling a file integrity check on uploaded images and anti-forgery tokens to prevent replay attacks. The fix was introduced in PowerSYSTEM Center update 12 as well as Update 8+Hotfix (both identified by release number 5.12.2305.10101, which can be located in Settings / Overview / Version).


Workaround

SUBNET Solutions recommends users to follow the following workarounds: * Users should verify that SVG files do not contain HTML elements or scripts and validate that JPG and PNG files are not SVG files. * Users should verify network security rules to ensure that outbound connections to the internet are not possible. * If the above cannot be performed or notifications are not required, disable email notifications for reports from PowerSYSTEM Center. * Monitor user activity and ensure application control rules only allow preauthorized executables to run. * Deny users to run other executables on client access servers (PowerSYSTEM Center front end access point).

History

Mon, 09 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2024-12-09T20:49:14.599Z

Reserved: 2023-05-25T16:04:56.578Z

Link: CVE-2023-29158

cve-icon Vulnrichment

Updated: 2024-08-02T14:00:15.368Z

cve-icon NVD

Status : Modified

Published: 2023-06-19T21:15:42.033

Modified: 2024-11-21T07:56:38.070

Link: CVE-2023-29158

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.