CVE-2026-26289: Sensitive Data Leak in PowerSYSTEM Center
Plattform
other
Komponente
subnet-solutions-powersystem-center
Behoben in
5.28.1
CVE-2026-26289 is a security vulnerability affecting PowerSYSTEM Center, a software solution for power system management. The vulnerability resides in the REST API endpoint for device account export, which allows an authenticated user with limited permissions to expose sensitive information normally restricted to administrative permissions. This flaw can lead to unauthorized access to confidential data. The vulnerability affects versions 5.8.0 through 7.0.x, and has been addressed in version 5.28.1.
Auswirkungen und Angriffsszenarien
The impact of CVE-2026-26289 is significant due to the potential for unauthorized disclosure of sensitive information. An attacker who has authenticated to PowerSYSTEM Center with limited permissions can exploit this vulnerability to export device account data, which may contain credentials, configuration details, or other confidential information. This data could be used for further attacks, such as privilege escalation or data theft. The blast radius extends to any system or application that relies on the exported device account data. The vulnerability highlights the importance of implementing robust access controls and limiting user permissions to the minimum necessary.
Ausnutzungskontext
CVE-2026-26289 was published on 2026-05-12. Currently, there are no known public exploits or active campaigns targeting this vulnerability. The CVSS score of 8.2 (HIGH) indicates a significant risk. It is not listed on KEV or EPSS as of this writing, suggesting a low to medium probability of exploitation in the near term. Refer to the vendor's security advisories and the NVD for updates and further information.
Bedrohungsanalyse
Exploit-Status
CVSS-Vektor
Was bedeuten diese Metriken?
- Attack Vector
- Angrenzend — Netzwerknähe erforderlich: gleiches LAN, Bluetooth oder lokales Funksegment.
- Attack Complexity
- Niedrig — keine besonderen Bedingungen erforderlich. Zuverlässig ausnutzbar.
- Privileges Required
- Niedrig — jedes gültige Benutzerkonto ist ausreichend.
- User Interaction
- Keine — automatischer und lautloser Angriff. Das Opfer tut nichts.
- Scope
- Geändert — Angriff kann über die anfällige Komponente hinaus auf andere Systeme übergreifen.
- Confidentiality
- Hoch — vollständiger Vertraulichkeitsverlust. Angreifer kann alle Daten lesen.
- Integrity
- Niedrig — Angreifer kann einige Daten mit begrenztem Umfang ändern.
- Availability
- Niedrig — partieller oder intermittierender Denial of Service.
Betroffene Software
Schwachstellen-Klassifikation (CWE)
Zeitleiste
- Veröffentlicht
- Geändert
Mitigation und Workarounds
The primary mitigation for CVE-2026-26289 is to upgrade PowerSYSTEM Center to version 5.28.1 or later. If an immediate upgrade is not possible, consider implementing temporary workarounds. Restrict access to the device account export endpoint to only authorized administrative users. Implement multi-factor authentication (MFA) to enhance the security of user accounts. Regularly review user permissions and ensure they are aligned with the principle of least privilege. Monitor PowerSYSTEM Center logs for suspicious activity related to device account exports. Consider implementing a Web Application Firewall (WAF) to filter out unauthorized requests. After upgrading, confirm the fix by attempting to export device account data with a non-administrative user account and verifying that the export is denied.
So behebenwird übersetzt…
Actualice PowerSYSTEM Center a la versión 5.28.1 o posterior, 6.1.1 o posterior, o 7.0.0 o posterior para mitigar la vulnerabilidad. Esta actualización corrige el problema de autorización incorrecta en la API REST de exportación de cuentas de dispositivos, evitando la exposición de información sensible.
Häufig gestellte Fragen
Was ist CVE-2026-26289 in PowerSYSTEM Center?
It's a vulnerability in PowerSYSTEM Center allowing authenticated users to export sensitive data they shouldn't have access to.
Bin ich von CVE-2026-26289 in PowerSYSTEM Center betroffen?
If you're using PowerSYSTEM Center versions 5.8.0 through 7.0.x, you are potentially affected. Upgrade to 5.28.1 or later.
Wie behebe ich CVE-2026-26289 in PowerSYSTEM Center?
Upgrade to PowerSYSTEM Center version 5.28.1 or later. Restrict access to the export endpoint as a temporary measure.
Wird CVE-2026-26289 aktiv ausgenutzt?
No known exploits or active campaigns have been reported, but the risk remains high.
Wo finde ich den offiziellen PowerSYSTEM Center-Hinweis für CVE-2026-26289?
Consult the vendor's security advisories and the NVD entry for CVE-2026-26289.
Ist dein Projekt betroffen?
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Jetzt testen — kein Konto
Laden Sie ein Manifest hoch (composer.lock, package-lock.json, WordPress Plugin-Liste…) oder fügen Sie Ihre Komponentenliste ein. Sie erhalten sofort einen Schwachstellenbericht. Das Hochladen einer Datei ist nur der Anfang: Mit einem Konto erhalten Sie kontinuierliche Überwachung, Slack/email-Benachrichtigungen, Multi-Projekt- und White-Label-Berichte.
Abhängigkeitsdatei hier ablegen
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...