Description
PowerSYSTEM Center REST API endpoint for devices allows a low privilege authenticated user to access information normally limited by operational permissions.
Published: 2026-05-12
Score: 6.9 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

PowerSYSTEM Center's REST API endpoint for devices suffers from an incorrect authorization flaw that permits a low‑privilege authenticated user to retrieve information that should be restricted by operational permissions, leading to unauthorized disclosure of sensitive data. The vulnerability falls under CWE‑863, incorrect authorization, and directly threatens the confidentiality of system information. Attackers need only valid credentials with minimal permissions and access to the API to exploit the issue.

Affected Systems

Subnet Solutions' PowerSYSTEM Center 2020 is affected. Versions prior to the issuance of PSC 2020 Update 29—specifically earlier releases before PSC 2024 Update 2 and PSC 2026 GA Hotfix—are vulnerable. The fix is available in those updates, so any installation of PowerSYSTEM Center that has not applied at least PSC 2020 Update 29 should be considered compromised. No other products or vendors were explicitly listed in the CVE report.

Risk and Exploitability

The CVSS score of 6.9 indicates a medium severity impact. The attack vector is over the network via the REST API, requiring only authentication with low privileges and no special user interaction, so exploitation is straightforward. Although the EPSS score is unavailable and the vulnerability is not listed in the CISA KEV catalog, the existence of the flaw and the availability of a potential exploit still warrant prompt remedial action. Organizations with active subnet solution deployments should treat this as a moderate to high risk, especially in environments where operational permission boundaries are critical.

Generated by OpenCVE AI on May 12, 2026 at 22:36 UTC.

Remediation

Vendor Solution

Subnet Solutions recommends users update to the latest version of PowerSYSTEM Center PSC 2020 Update 29, PSC 2024 Update 2, and PSC 2026 GA Hotfix. For assistance in upgrading, users should contact a Subnet Solutions System Integration team member or customer support team at (403) 270-8885 or by email at [support@subnet.com](mailto:support@subnet.com). Subnet Solutions recommends users do the following in order to reduce risk: * Monitor user activity records to ensure users are following acceptable usage policies of the application. * Restrict access to Notification Settings to trusted Administrators Monitor "Send from Address" in settings and Activity Records. * Configure a notification rule that triggers in any bulk account export activity.


OpenCVE Recommended Actions

  • Upgrade to PSC 2020 Update 29 or newer releases (PSC 2024 Update 2, PSC 2026 GA Hotfix).
  • Restrict access to Notification Settings to trusted administrators and monitor "Send from Address" in settings and activity records.
  • Configure a notification rule to trigger on any bulk account export activity.

Generated by OpenCVE AI on May 12, 2026 at 22:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description PowerSYSTEM Center REST API endpoint for devices allows a low privilege authenticated user to access information normally limited by operational permissions.
Title Subnet Solutions PowerSYSTEM Center Incorrect Authorization
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-05-13T00:19:39.177Z

Reserved: 2026-04-16T14:05:42.141Z

Link: CVE-2026-33570

cve-icon Vulnrichment

Updated: 2026-05-13T00:19:34.847Z

cve-icon NVD

Status : Received

Published: 2026-05-12T22:16:33.410

Modified: 2026-05-12T22:16:33.410

Link: CVE-2026-33570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T22:45:15Z

Weaknesses