Vulnerability

CISA Issues Warning About Iskra iHUB Authentication Flaw Allowing Remote Device Reconfiguration

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical advisory warning of a high-severity authentication flaw in Iskra’s iHUB and iHUB Lite intelligent metering gateways.

Released on December 2, 2025, under alert code ICSA-25-336-02, the vulnerability enables remote attackers to reconfigure devices, update firmware, and tamper with connected systems without credentials.

Assigned CVE-2025-13510, it stems from a missing authentication mechanism on the web management interface, classified as CWE-306.

Deployed worldwide in the energy sector, these devices from Slovenian vendor Iskra pose risks to industrial control systems (ICS). Read the complete advisory and CSAF.

Vulnerability Technical Breakdown

Iskra iHUB and iHUB Lite serve as data concentrators in smart metering setups, aggregating and relaying utility data. All versions remain vulnerable, as confirmed in CISA’s analysis.

The core issue exposes the web interface without login checks, granting unauthenticated access to sensitive endpoints.

Attackers can alter configurations, push malicious firmware, or disrupt metering operations remotely over the network.

This flaw earns top-tier severity scores due to its network accessibility and low complexity:

CVSS VersionBase ScoreVector StringKey Metrics
v3.19.1 (Critical)AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NNetwork attack (AV:N), no privileges needed (PR:N), high confidentiality/integrity impact
v4.09.3 (Critical)AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:NAdds attack timing (AT:N), emphasizes vulnerable system impacts (VC:H/VI:H)

Security researcher Souvik Kandar disclosed the issue to CISA. No patches exist yet, as Iskra failed to coordinate.

The advisory highlights the potential for exploitation in energy infrastructure, where gateways often bridge operational technology (OT) to IT networks.

Successful attacks could cascade failures in power distribution or billing systems, enabling sabotage without detection.

CISA stresses immediate defensive steps, prioritizing network isolation. Organizations should block internet exposure for iHUB devices, segment ICS networks behind firewalls, and avoid direct remote access.

For essential connectivity, deploy updated VPNs, but assess device-side risks first.

Broader guidance includes CISA’s ICS recommended practices, defense-in-depth strategies (PDF), and proactive ICS cybersecurity.

Conduct impact analyses before changes. Report suspicious activity to CISA. No public exploits target this flaw yet, but its simplicity demands urgency.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies..

Recent Posts

Burp Suite Supercharges Its Scanning Capabilities With React2Shell Vulnerability Detection

PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…

4 months ago

Malicious MCP Servers Enable New Prompt Injection Attack To Drain Resources

Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…

4 months ago

Law Enforcement Detains Hackers Equipped With Specialized Flipper Hacking Tools

Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…

4 months ago

Google Unveils 10 New Gemini-Powered AI Features For Chrome

Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…

4 months ago

CISA Alerts On Actively Exploited Buffer Overflow Flaw In D-Link Routers

Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…

4 months ago

Over 500 Apache Tika Toolkit Instances Exposed To Critical XXE Vulnerability

Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…

4 months ago