CVE-2024-28042

8.4 HIGH

📋 TL;DR

This vulnerability in PowerSYSTEM Center's third-party components allows attackers to execute arbitrary code or cause denial-of-service conditions. Organizations using affected PowerSYSTEM Center versions are at risk, particularly in industrial control system environments where this software manages electrical power systems.

💻 Affected Systems

Products:
  • SUBNET Solutions PowerSYSTEM Center
Versions: All versions prior to 2024.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in third-party components used by PowerSYSTEM Center, affecting all deployments using these components.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code with high privileges, potentially disrupting power management operations and enabling lateral movement within industrial networks.

🟠

Likely Case

Denial-of-service conditions affecting PowerSYSTEM Center functionality, potentially disrupting monitoring and control of electrical power systems.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing exploitation attempts from reaching vulnerable systems.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Based on CVSS score and CWE-1357 (Reliance on Insufficiently Trustworthy Components), exploitation likely requires some technical knowledge but no authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PowerSYSTEM Center 2024.1

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-24-135-02

Restart Required: Yes

Instructions:

1. Download PowerSYSTEM Center 2024.1 from SUBNET Solutions portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart the PowerSYSTEM Center service. 5. Verify functionality post-update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate PowerSYSTEM Center systems from untrusted networks and implement strict firewall rules.

Access Control Restrictions

all

Implement strict access controls and limit connections to PowerSYSTEM Center to authorized management systems only.

🧯 If You Can't Patch

  • Implement network segmentation to isolate PowerSYSTEM Center from other systems
  • Deploy intrusion detection systems and monitor for exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check PowerSYSTEM Center version in administration interface or via installed programs list in Windows.

Check Version:

Not applicable - check via PowerSYSTEM Center GUI or Windows Programs and Features

Verify Fix Applied:

Verify version shows 2024.1 or later in PowerSYSTEM Center administration interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation events
  • Unexpected service restarts
  • Authentication failures from unknown sources

Network Indicators:

  • Unusual network traffic to PowerSYSTEM Center ports
  • Connection attempts from unauthorized IP addresses

SIEM Query:

source="PowerSYSTEM Center" AND (event_type="process_creation" OR event_type="service_restart")

🔗 References

📤 Share & Export