PowerSYSTEM Center versions 2020 Update 16 and prior contain a vulnerability that may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.





Advisories
Source ID Title
EUVD EUVD EUVD-2023-58854 PowerSYSTEM Center versions 2020 Update 16 and prior contain a vulnerability that may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.
Fixes

Solution

Subnet Solutions recommends users upgrade to PowerSYSTEM Center versions 2020 Update 17 or later. To obtain this software, contact Subnet Solution's Customer Service https://subnet.com/contact/ .


Workaround

Additionally, Subnet Solutions recommends users apply Application Allowlisting on PowerSYSTEM Center Device Communication Server (DCS) hosts to ensure only trusted executables are able to be run. If unable to apply PowerSYSTEM Center 2020 Update 17, Subnet Solutions recommends users mitigate risk by logging in to the DCS as administrator, opening the Registry Editor, navigating to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services, locating all pscagent.* entries, and modifying the ImagePath key by enclosing it within double quotes ("). Restart computer when complete.

History

Tue, 03 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-06-03T14:34:35.451Z

Reserved: 2023-12-08T17:28:43.750Z

Link: CVE-2023-6631

cve-icon Vulnrichment

Updated: 2024-08-02T08:35:14.886Z

cve-icon NVD

Status : Modified

Published: 2024-01-08T19:15:10.507

Modified: 2024-11-21T08:44:15.150

Link: CVE-2023-6631

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.