Browse all 3 CVE security advisories affecting SUBNET. AI-powered Chinese analysis, POCs, and references for each vulnerability.
SUBNET is a network security tool primarily used for vulnerability scanning and compliance management across IT infrastructures. Historically, it has been associated with vulnerabilities including remote code execution, cross-site scripting, and privilege escalation, with three CVEs documented. The platform typically requires elevated access for full functionality, which has led to misconfigurations being a common security concern. While no major public security incidents have been widely reported, its privileged access requirements make it a potential target for attackers seeking lateral movement within networks. Regular updates and proper configuration are critical to mitigating risks associated with its deployment.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2024-26024 | SUBNET Substation Server Reliance on Insufficiently Trustworthy Component — Substation ServerCWE-1357 | 8.4 | High | 2024-05-28 |
| CVE-2024-28042 | SUBNET PowerSYSTEM Center Reliance on Insufficiently Trustworthy Component — PowerSYSTEM CenterCWE-1357 | 8.4 | High | 2024-05-15 |
| CVE-2014-2357 | SUBNET SubSTATION Server 2 Telegyr 8979 Master Protocol Improper Input Validation — SubSTATION Server 2 Telegyr 8979 Master ProtocolCWE-20 | 7.5 | - | 2014-08-11 |
This page lists every published CVE security advisory associated with SUBNET. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.