PowerSYSTEM Center versions 2020 Update 16 and prior contain a vulnerability that may allow an authorized local user to insert arbitrary code into the unquoted service path and escalate privileges.
Solution:
Workaround:
The product uses a search path that contains an unquoted element, in which the element contains whitespace or other separators. This can cause the product to access resources in a parent path.
Link | Tags |
---|---|
https://www.cisa.gov/news-events/ics-advisories/icsa-23-353-01 | third party advisory us government resource |
https://subnet.com/contact/ | product |