SUBNET SubSTATION Server 2 Telegyr 8979 Master Protocol Improper Input Validation
Summary
| CVE | CVE-2014-2357 |
|---|---|
| State | PUBLISHED |
| Assigner | icscert |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2014-08-11 22:55:04 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | The GPT library in the Telegyr 8979 Master Protocol application in SUBNET SubSTATION Server 2 before SSNET 2.12 HF18808 allows remote attackers to cause a denial of service (persistent service crash) via a long RTU-to-Master message. |
Risk And Classification
Primary CVSS: v2.0 7.1 from [email protected]
AV:N/AC:M/Au:N/C:N/I:N/A:C
Problem Types: CWE-20 | CWE-119 | CWE-20 CWE-20
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 2.0 | [email protected] | Primary | 7.1 | AV:N/AC:M/Au:N/C:N/I:N/A:C | |
| 2.0 | [email protected] | Secondary | 8.3 | AV:A/AC:L/Au:N/C:C/I:C/A:C | |
| 2.0 | CNA | CVSS | 8.3 | AV:A/AC:L/Au:N/C:C/I:C/A:C |
CVSS v2.0 Breakdown
AV:N/AC:M/Au:N/C:N/I:N/A:C
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Subnet | Substation Server | All | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | SUBNET | SubSTATION Server 2 Telegyr 8979 Master Protocol | affected all versions | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SubSTATION Server Telegyr 8979 Master Vulnerabilities | ICS-CERT | af854a3a-2127-422b-91ae-364da2661108 | ics-cert.us-cert.gov | US Government Resource |
| www.cisa.gov/news-events/ics-advisories/icsa-14-196-01 | [email protected] | www.cisa.gov | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Adam Crain of Automatak and Chris Sistrunk of Mandiant (en)
Additional Advisory Data
Solutions
CNA: SUBNET has produced hot fix “SSNET v2.12 HF18808” to resolve this issue. This hot fix can be obtained by secure FTP provided by the SUBNET support department. Please contact SUBNET Customer Support at: (403) 270-8885, or by email at: [email protected] and reference SUBNET Release Bulletin “SubSTATION Server 2.12 HF18808 Release, 21 May 2014” for a copy of this release bulletin and download/installation information (This bulletin is being sent to registered users only). Vendor Recommendation: * The exploit results in an unrecoverable exception, but all software components are registered as Services under Windows and can be configured to automatically restart after any stoppage. Users can configure the service to automatically restart, which limits the DoS to a momentary disruption. * Backward compatible releases will be available by request for customers using older versions of SubSTATION Server.