Description
Subnet Solutions

PowerSYSTEM Center is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the API may trigger an exception, resulting in a denial-of-service condition.
Published: 2025-04-11
Score: 6.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Subnet Solutions Inc. recommends users update PowerSYSTEM Center (PSC) to the latest versions: * PSC 2020 Update 25 * PSC 2024 For assistance with updating PSC, reach out directly to Subnet Solutions.


Vendor Workaround

If updating PSC is not possible, Subnet Solutions Inc recommends users apply the following mitigations to help reduce risk: * Disable Notification Service, Email Dispatch Service, or the outgoing email server in Notifications/Settings. * Configure PowerSYSTEM Center DCS network firewall to only allow connections to an approved and authorized email server. * Manage administrator access to PowerSYSTEM Center DCS operating system. * Monitor user activity records to ensure users are following acceptable usage policies of the application.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10827 Subnet Solutions PowerSYSTEM Center is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the API may trigger an exception, resulting in a denial-of-service condition.
History

Fri, 11 Apr 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 11 Apr 2025 15:45:00 +0000

Type Values Removed Values Added
Description Subnet Solutions PowerSYSTEM Center is affected by a mishandling of exceptional conditions vulnerability. Crafted data that is passed to the API may trigger an exception, resulting in a denial-of-service condition.
Title Subnet Solutions PowerSYSTEM Center Deserialization of Untrusted Data
Weaknesses CWE-502
References
Metrics cvssV3_1

{'score': 6.2, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-04-11T16:12:37.100Z

Reserved: 2025-04-08T00:02:45.747Z

Link: CVE-2025-31935

cve-icon Vulnrichment

Updated: 2025-04-11T16:12:31.808Z

cve-icon NVD

Status : Deferred

Published: 2025-04-11T16:15:20.047

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-31935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses