PowerSYSTEM Center email notification service is affected by a CRLF injection vulnerability when using SMTPS communication.

Project Subscriptions

Vendors Products
Subnet Solutions Subscribe
Powersystem Center 2020 Subscribe
Powersystem Center 2024 Subscribe
Powersystem Center 2026 Subscribe
Advisories

No advisories yet.

Fixes

Solution

Subnet Solutions recommends users update to the latest version of PowerSYSTEM Center PSC 2020 Update 29, PSC 2024 Update 2, and PSC 2026 GA Hotfix. For assistance in upgrading, users should contact a Subnet Solutions System Integration team member or customer support team at (403) 270-8885 or by email at [support@subnet.com](mailto:support@subnet.com). Subnet Solutions recommends users do the following in order to reduce risk: * Monitor user activity records to ensure users are following acceptable usage policies of the application. * Restrict access to Notification Settings to trusted Administrators Monitor "Send from Address" in settings and Activity Records. * Configure a notification rule that triggers in any bulk account export activity.


Workaround

No workaround given by the vendor.

History

Wed, 13 May 2026 11:00:00 +0000

Type Values Removed Values Added
First Time appeared Subnet Solutions
Subnet Solutions powersystem Center 2020
Subnet Solutions powersystem Center 2024
Subnet Solutions powersystem Center 2026
Vendors & Products Subnet Solutions
Subnet Solutions powersystem Center 2020
Subnet Solutions powersystem Center 2024
Subnet Solutions powersystem Center 2026

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 21:00:00 +0000

Type Values Removed Values Added
Description PowerSYSTEM Center email notification service is affected by a CRLF injection vulnerability when using SMTPS communication.
Title Subnet Solutions PowerSYSTEM Center CRLF injection
Weaknesses CWE-93
References
Metrics cvssV3_1

{'score': 5.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV4_0

{'score': 5.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-05-12T21:12:55.834Z

Reserved: 2026-04-16T14:05:42.158Z

Link: CVE-2026-35504

cve-icon Vulnrichment

Updated: 2026-05-12T21:12:45.666Z

cve-icon NVD

Status : Received

Published: 2026-05-12T21:16:15.417

Modified: 2026-05-12T21:16:15.417

Link: CVE-2026-35504

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T10:35:50Z

Weaknesses