On January 8, 2026, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released an Industrial Control Systems (ICS) advisory, ICSA-26-008-01, detailing a remote code execution (RCE) vulnerability in Hitachi Energy's Asset Suite. The vulnerability, tracked as CVE-2025-10492, originates from a vulnerable version of a third-party software component, Jasper Report, embedded within the Asset Suite product. A successful exploit could allow an attacker to execute arbitrary code on the affected system. Hitachi Energy's Asset Suite is used in the energy sector, making this a notable risk for critical infrastructure. There is currently no evidence of active exploitation. CISA recommends that asset owners apply vendor-provided mitigations and ensure control system networks are properly segmented from the internet.
The advisory applies to specific versions of the Hitachi Energy Asset Suite. Customers using this product should consult the official advisory from Hitachi Energy or CISA for a definitive list of affected versions and apply the necessary updates or mitigations.
As of the advisory's publication, CISA has not received any reports of this vulnerability being actively exploited in the wild. However, the public disclosure of the flaw could lead to threat actors developing exploits and scanning for vulnerable systems.
A successful RCE exploit against the Hitachi Energy Asset Suite could have serious consequences, particularly given its use in the Energy sector. An attacker could potentially:
The exact impact depends on the system's configuration and its role within the broader control system architecture.
CISA and Hitachi Energy recommend the following actions:
D3-NI - Network Isolation.Applying the vendor-provided patch or mitigation is the direct remediation for the vulnerability.
Mapped D3FEND Techniques:
Isolating the OT network from the IT network and the internet is a fundamental security principle for ICS environments.
Strictly controlling traffic between network segments can prevent an attacker from reaching the vulnerable system.
For critical infrastructure systems like the Hitachi Energy Asset Suite, the most important security control is robust network isolation. The OT network where this system resides must be physically or logically separated from the corporate IT network and, most importantly, from the public internet. A Purdue Model architecture with a demilitarized zone (DMZ) between IT and OT should be implemented. All communication between these zones must be mediated by firewalls with strict, 'default-deny' rule sets. This ensures that even if a vulnerability like CVE-2025-10492 exists, an external attacker has no direct network path to exploit it. This is a non-negotiable, foundational practice for all ICS/OT security programs.
The fact that CVE-2025-10492 originates in a third-party component (Jasper Report) highlights the critical need for Software Bill of Materials (SBOM) management. Asset owners in the energy sector must require their vendors, including Hitachi Energy, to provide a detailed SBOM for all products. This allows the asset owner to proactively identify their exposure when a vulnerability is disclosed in a common library like Jasper Report, rather than waiting for the product vendor to issue their own advisory. This proactive stance on supply chain vulnerability management allows for faster risk assessment and mitigation planning.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats