PowerSYSTEM Center REST API endpoint for devices allows a low privilege authenticated user to access information normally limited by operational permissions.

Project Subscriptions

Vendors Products
Subnet Solutions Subscribe
Powersystem Center 2020 Subscribe
Advisories

No advisories yet.

Fixes

Solution

Subnet Solutions recommends users update to the latest version of PowerSYSTEM Center PSC 2020 Update 29, PSC 2024 Update 2, and PSC 2026 GA Hotfix. For assistance in upgrading, users should contact a Subnet Solutions System Integration team member or customer support team at (403) 270-8885 or by email at [support@subnet.com](mailto:support@subnet.com). Subnet Solutions recommends users do the following in order to reduce risk: * Monitor user activity records to ensure users are following acceptable usage policies of the application. * Restrict access to Notification Settings to trusted Administrators Monitor "Send from Address" in settings and Activity Records. * Configure a notification rule that triggers in any bulk account export activity.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Subnet Solutions
Subnet Solutions powersystem Center 2020
Vendors & Products Subnet Solutions
Subnet Solutions powersystem Center 2020

Wed, 13 May 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 21:30:00 +0000

Type Values Removed Values Added
Description PowerSYSTEM Center REST API endpoint for devices allows a low privilege authenticated user to access information normally limited by operational permissions.
Title Subnet Solutions PowerSYSTEM Center Incorrect Authorization
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.7, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}

cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-05-13T00:19:39.177Z

Reserved: 2026-04-16T14:05:42.141Z

Link: CVE-2026-33570

cve-icon Vulnrichment

Updated: 2026-05-13T00:19:34.847Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-12T22:16:33.410

Modified: 2026-05-13T15:52:56.850

Link: CVE-2026-33570

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:35:37Z

Weaknesses