The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued six new security advisories concerning vulnerabilities in Industrial Control Systems (ICS) from two major vendors: Hitachi Energy and Mitsubishi Electric. The advisories, released on January 8, 2026, address flaws in products used extensively across critical infrastructure, including the Energy sector. Asset owners and operators are strongly encouraged to review the advisories and apply mitigations to protect their operational technology (OT) environments from potential cyberattacks.
CISA released a total of six advisories, breaking down as follows:
Hitachi Energy (1 Advisory):
ICSA-26-008-01: This advisory details vulnerabilities in the Hitachi Energy Asset Suite, a product line used for asset management within the Energy sector.Mitsubishi Electric (5 Advisories):
While the specific CVEs and severity scores for each vulnerability are detailed within the individual advisories on CISA's website, the collective release highlights an ongoing focus by security researchers and government agencies on securing OT environments. Vulnerabilities in these systems can have physical consequences, leading to operational shutdowns, equipment damage, or safety incidents.
These products are deployed globally across numerous critical infrastructure sectors, including but not limited to:
Exploitation of vulnerabilities in ICS/SCADA systems can have severe and far-reaching consequences. Depending on the specific flaw, a successful attack could allow an adversary to:
CISA recommends that asset owners take the following defensive measures:
Isolate OT networks from IT networks and the internet to reduce exposure to threats.
Apply vendor-provided patches for the identified vulnerabilities in a timely manner.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats