Severe Security Flaw in Iskra iHUB Devices Threatens Global Energy Infrastructure, CISA Warns

Critical Vulnerability in Iskra iHUB Devices Poses Severe Risk to Global Energy Infrastructure

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert concerning a significant security flaw in Iskra’s iHUB and iHUB Lite intelligent metering gateways, which are integral components of energy infrastructure worldwide. This vulnerability, identified as CVE-2025-13510, has been assigned a CVSS v4 severity score of 9.3, indicating a high level of risk due to its ease of exploitation.

Understanding the Vulnerability

The core issue lies in the absence of authentication mechanisms on the web management interface of the affected devices. This oversight allows remote attackers to access the control panel without requiring any credentials. Once inside, malicious actors can reconfigure device settings, update firmware, and potentially manipulate connected systems within energy networks. Given the widespread deployment of these devices across the global energy sector, this vulnerability presents a substantial threat to critical infrastructure.

Technical Details

– CVE ID: CVE-2025-13510
– Affected Products: iHUB and iHUB Lite (All Versions)
– Vulnerability Type: Missing Authentication for Critical Function (CWE-306)
– CVSS v4 Score: 9.3
– Attack Vector: Network-based, remotely exploitable

Implications for Energy Infrastructure

The exploitation of this vulnerability could have far-reaching consequences, including unauthorized control over energy distribution, disruption of services, and potential cascading effects on other critical infrastructure sectors. The ability to remotely reconfigure devices without authentication undermines the integrity and reliability of energy systems, posing risks to both operational continuity and public safety.

Lack of Vendor Response

CISA’s attempts to coordinate with Iskra have not yielded a response, leaving organizations without official patches or guidance from the vendor. This lack of communication necessitates that organizations take proactive measures to secure their systems.

Recommended Mitigation Strategies

In light of the absence of vendor-provided solutions, CISA recommends the following defensive measures:

1. Network Segmentation: Isolate control system infrastructure from internet-facing networks to minimize exposure.

2. Firewall Deployment: Position devices behind firewalls with strict access controls to prevent unauthorized access.

3. Secure Remote Access: Utilize Virtual Private Networks (VPNs) for any necessary remote administration to ensure secure communication channels.

4. Monitoring and Detection: Implement network monitoring to detect suspicious administrative access attempts and anomalous configuration changes on affected devices.

Organizations are advised to conduct thorough risk assessments before implementing these measures and to report any suspected malicious activity to CISA for further analysis and correlation with other incidents.

Conclusion

The discovery of this critical vulnerability in Iskra’s iHUB devices underscores the importance of robust security practices in the management of energy infrastructure. Organizations must remain vigilant, implement recommended mitigations, and stay informed about potential threats to ensure the resilience and security of their operations.