VulnerabilitiesCRITICAL

Hitachi Energy Ellipse - Critical Jasper Report Vulnerability

CICISA Advisories
CVE-2025-10492Hitachi EnergyJasper ReportEllipseRemote Code Execution
🎯

Basically, there's a serious flaw in Hitachi Energy's software that could let hackers run harmful code remotely.

Quick Summary

Hitachi Energy has revealed a critical vulnerability in its Ellipse software, affecting versions 9.0.50 and earlier. This flaw allows remote code execution, posing serious risks to users. Immediate action is required to mitigate potential attacks.

What Happened

Hitachi Energy has identified a critical vulnerability in the Jasper Report component used in its Ellipse product. This flaw, tracked as CVE-2025-10492, can be exploited to perform remote code execution (RCE) attacks. Essentially, attackers could gain control over systems running affected versions of Ellipse, leading to severe security risks.

Who's Affected

The vulnerability affects all versions of Hitachi Energy Ellipse that are 9.0.50 or earlier. This includes a wide range of installations across various sectors, particularly in the critical manufacturing industry, which is vital for infrastructure and economic stability.

What Data Was Exposed

While specific data exposure details are not disclosed, the ability to execute arbitrary code remotely means that attackers could potentially access sensitive data, manipulate system operations, or disrupt services. This poses a significant risk to organizations relying on Ellipse for their operations.

What You Should Do

To mitigate this vulnerability, organizations should:

  • Restrict the loading of external custom reports: Only allow trusted reports generated by system administrators.
  • Implement strong network defenses: Ensure that control systems are not directly accessible from the internet and are protected by firewalls.
  • Regularly update software: Keep all systems, including third-party components like Jasper Reports, up to date with the latest security patches.

Immediate Actions

CISA recommends that organizations take immediate defensive measures to minimize the risk of exploitation. This includes conducting a thorough impact analysis and risk assessment before deploying any changes. Additionally, organizations should monitor for any suspicious activity and report findings to CISA for correlation with other incidents.

Conclusion

The discovery of this vulnerability highlights the importance of maintaining robust security practices in industrial control systems. Organizations using Hitachi Energy Ellipse must act promptly to protect their systems from potential exploitation and ensure the integrity of their operations.

🔒 Pro insight: Organizations must prioritize patching and restricting report access to mitigate risks associated with CVE-2025-10492 effectively.

Original article from

CICISA Advisories· CISA
Read Full Article

Related Pings

CRITICALVulnerabilities

CVE-2025-55182 - Hackers Breach 766 Next.js Hosts

Hackers have exploited a critical vulnerability in Next.js, breaching 766 hosts and stealing sensitive credentials. Organizations must take swift action to mitigate risks and secure their systems.

The Hacker News·
HIGHVulnerabilities

OpenSSH Vulnerabilities - Security Advisory Released

OpenSSH has issued a security advisory for vulnerabilities in versions prior to 10.3. Users need to update to the latest version to protect their systems. This advisory highlights critical risks that could lead to unauthorized access. Stay secure by applying the necessary updates.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Progress ShareFile - Security Vulnerability Advisory Released

Progress has issued a security advisory for ShareFile vulnerabilities. Users must update to versions v5.12.4 or later to protect their data. This is crucial for maintaining security.

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Mongoose Vulnerabilities - Cesanta Issues Security Advisory

Cesanta has issued a security advisory for Mongoose, affecting versions 7.0 to 7.20. Users must update to safeguard against vulnerabilities. Don't wait—protect your systems now!

Canadian Cyber Centre Alerts·
HIGHVulnerabilities

Cisco Patches Critical and High-Severity Vulnerabilities

Cisco has patched critical vulnerabilities that could allow attackers to bypass authentication and gain system access. Organizations using Cisco products are urged to update immediately to avoid risks.

Security Affairs·
CRITICALVulnerabilities

Critical Vulnerability Found in Claude Code After Source Leak

A critical vulnerability in Claude Code was discovered shortly after its source code leak. This flaw could allow attackers to bypass security measures and steal sensitive credentials, posing a significant risk. Developers must act quickly to protect their systems.

SecurityWeek·