{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-31354","assignerOrgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","state":"PUBLISHED","assignerShortName":"icscert","dateReserved":"2025-04-08T00:02:45.758Z","datePublished":"2025-04-11T15:30:24.676Z","dateUpdated":"2025-04-11T16:13:34.583Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PowerSYSTEM Center 2020","vendor":"Subnet Solutions","versions":[{"lessThanOrEqual":"5.24.x","status":"affected","version":"0","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Subnet Solutions Inc. reported this vulnerability to CISA."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">\n\n<span style=\"background-color: rgb(255, 255, 255);\">Subnet Solutions</span> PowerSYSTEM Center's SMTPS notification service can be affected by importing an EC certificate with crafted F2m parameters, which can lead to excessive CPU consumption during the evaluation of the curve parameters.</span>"}],"value":"Subnet Solutions PowerSYSTEM Center's SMTPS notification service can be affected by importing an EC certificate with crafted F2m parameters, which can lead to excessive CPU consumption during the evaluation of the curve parameters."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"LOW","baseScore":4.3,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]},{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":5.3,"baseSeverity":"MEDIUM","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"LOW","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"NONE","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-125","description":"CWE-125","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"7d14cffa-0d7d-4270-9dc0-52cabd5a23a6","shortName":"icscert","dateUpdated":"2025-04-11T15:30:24.676Z"},"references":[{"url":"https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-08"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Subnet Solutions Inc. recommends users update PowerSYSTEM Center (PSC) to the latest versions:</p><ul><li>PSC 2020 Update 25</li><li>PSC 2024</li></ul>\n\n\n\n<span style=\"background-color: rgb(255, 255, 255);\">For assistance with updating PSC, reach out directly to </span><a target=\"_blank\" rel=\"nofollow\">Subnet Solutions</a><span style=\"background-color: rgb(255, 255, 255);\">.</span>\n\n<br>"}],"value":"Subnet Solutions Inc. recommends users update PowerSYSTEM Center (PSC) to the latest versions:\n\n  *  PSC 2020 Update 25\n  *  PSC 2024\n\n\n\n\n\n\nFor assistance with updating PSC, reach out directly to Subnet Solutions."}],"source":{"advisory":"ICSA-25-100-08","discovery":"INTERNAL"},"title":"Subnet Solutions PowerSYSTEM Center Out-of-Bounds Read","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>If updating PSC is not possible, Subnet Solutions Inc recommends users apply the following mitigations to help reduce risk:</p><ul><li>Disable Notification Service, Email Dispatch Service, or the outgoing email server in Notifications/Settings.</li><li>Configure PowerSYSTEM Center DCS network firewall to only allow connections to an approved and authorized email server.</li><li>Manage administrator access to PowerSYSTEM Center DCS operating system.</li><li>Monitor user activity records to ensure users are following acceptable usage policies of the application.</li></ul>\n\n<br>"}],"value":"If updating PSC is not possible, Subnet Solutions Inc recommends users apply the following mitigations to help reduce risk:\n\n  *  Disable Notification Service, Email Dispatch Service, or the outgoing email server in Notifications/Settings.\n  *  Configure PowerSYSTEM Center DCS network firewall to only allow connections to an approved and authorized email server.\n  *  Manage administrator access to PowerSYSTEM Center DCS operating system.\n  *  Monitor user activity records to ensure users are following acceptable usage policies of the application."}],"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-04-11T16:12:54.523904Z","id":"CVE-2025-31354","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-11T16:13:34.583Z"}}]}}