CVE-2025-31354

4.3 MEDIUM

📋 TL;DR

This vulnerability in Subnet Solutions PowerSYSTEM Center's SMTPS notification service allows attackers to cause denial of service through excessive CPU consumption by importing a crafted EC certificate with malicious F2m parameters. It affects organizations using PowerSYSTEM Center for industrial control system management. The impact is limited to service disruption rather than data compromise.

💻 Affected Systems

Products:
  • Subnet Solutions PowerSYSTEM Center
Versions: Specific versions not detailed in advisory; all versions with SMTPS notification service likely affected
Operating Systems: Windows-based systems running PowerSYSTEM Center
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using the SMTPS notification service with certificate import functionality enabled.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the SMTPS notification service, potentially disrupting critical alerting and monitoring functions in industrial environments.

🟠

Likely Case

Degraded performance of the notification service, causing delayed or missed alerts for system events.

🟢

If Mitigated

Minimal impact if certificate validation is properly restricted and monitoring is in place to detect abnormal CPU usage.

🌐 Internet-Facing: MEDIUM - The SMTPS service may be exposed to external connections for notifications, but exploitation requires certificate import capability.
🏢 Internal Only: MEDIUM - Internal attackers with access to certificate import functions could disrupt notification services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to import certificates into the system, suggesting some level of access or social engineering is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory; contact vendor for patched version

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-100-08

Restart Required: Yes

Instructions:

1. Contact Subnet Solutions for the latest patched version
2. Apply vendor-provided patch or update
3. Restart PowerSYSTEM Center services
4. Verify SMTPS notification functionality

🔧 Temporary Workarounds

Disable SMTPS certificate import

windows

Restrict ability to import external certificates into the SMTPS notification service

Configure via PowerSYSTEM Center administration interface

Network segmentation

all

Isolate PowerSYSTEM Center from untrusted networks to prevent certificate import attempts

Implement firewall rules to restrict access to PowerSYSTEM Center management interfaces

🧯 If You Can't Patch

  • Implement strict access controls to prevent unauthorized certificate imports
  • Monitor CPU usage on PowerSYSTEM Center servers for abnormal spikes

🔍 How to Verify

Check if Vulnerable:

Check PowerSYSTEM Center version and verify if SMTPS notification service with certificate import is enabled

Check Version:

Check version through PowerSYSTEM Center administration interface or vendor documentation

Verify Fix Applied:

Verify patch installation through vendor documentation and test certificate import functionality

📡 Detection & Monitoring

Log Indicators:

  • Failed or suspicious certificate import attempts
  • Abnormally high CPU usage by PowerSYSTEM Center processes

Network Indicators:

  • Unusual certificate uploads to PowerSYSTEM Center management interfaces

SIEM Query:

Process:PowerSYSTEM Center AND (CPU_Usage > 90% OR Event:Certificate_Import)

🔗 References

📤 Share & Export