Western Telematic Inc NPS Series, DSM Series, CPM Series
An authenticated attacker can exploit improper input validation (CWE-73) in Western Telematic NPS Series (firmware ≤6.62), DSM Series (firmware ≤6.62), and CPM Series (firmware ≤6.62) devices to read arbitrary files from the device filesystem. This allows unauthorized access to configuration files, credentials, and operational data stored locally on the affected network power management and console server devices. The vulnerability requires valid login credentials and network access to the management interface. Western Telematic has patched this issue: NPS units in firmware 4.02 or later, DSM/CPM units in firmware 8.06 or later.
- Network access to the device management interface (typically TCP port 80/443 or console port)
- Valid username and password for the affected device
- Device running vulnerable firmware version 6.62 or earlier
Patching may require device reboot — plan for process interruption
/api/v1/advisories/577d87ce-1877-41a6-a70d-7087c5c83c79Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.