Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2459: CWE-267 Privilege Defined with Unsafe Actions in Hitachi Energy Relion REB500

0
High
VulnerabilityCVE-2026-2459cvecve-2026-2459cwe-267
Published: Tue Feb 24 2026 (02/24/2026, 13:21:42 UTC)
Source: CVE Database V5
Vendor/Project: Hitachi Energy
Product: Relion REB500

Description

A vulnerability exists in REB500 for an authenticated user with Installer role to access and alter the contents of directories that the role is not authorized to do so.

AI-Powered Analysis

AILast updated: 02/24/2026, 14:16:43 UTC

Technical Analysis

CVE-2026-2459 identifies a privilege-related vulnerability in Hitachi Energy's Relion REB500, a protection and control device widely used in electrical power systems. The flaw arises from the Installer role being granted permissions that allow access and alteration of directories outside their authorized scope, violating the principle of least privilege. This is classified under CWE-267, which concerns privileges defined with unsafe actions. The vulnerability affects version 8.0.0.0 of the product. An attacker with legitimate Installer credentials can exploit this vulnerability remotely over the network without requiring user interaction, due to the network attack vector and no UI needed. The CVSS 4.0 base score is 7.4 (high), reflecting the high impact on confidentiality and integrity, as unauthorized directory access can lead to data tampering or exposure. The vulnerability does not affect availability and does not require user interaction but does require privileged authentication. No public exploits are known yet, but the risk is elevated given the critical nature of the affected systems. The lack of a patch at the time of publication necessitates immediate compensating controls. This vulnerability could be leveraged to escalate privileges or manipulate system configurations, potentially disrupting energy grid operations or causing data integrity issues in critical infrastructure environments.

Potential Impact

The vulnerability poses a significant risk to organizations operating critical energy infrastructure that relies on Hitachi Energy's Relion REB500 devices. Unauthorized access and modification of directories by an Installer role user can lead to unauthorized configuration changes, data tampering, or exposure of sensitive operational data. This compromises confidentiality and integrity, potentially leading to incorrect system behavior, operational disruptions, or cascading failures in power grid management. Given the network-exploitable nature and the high privileges required, insider threats or compromised Installer credentials could be leveraged for impactful attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once details are public. The impact is particularly critical for utilities and energy providers where system integrity and availability are paramount for safety and reliability. The vulnerability could also facilitate lateral movement or privilege escalation within the network, increasing the attack surface and risk of broader compromise.

Mitigation Recommendations

1. Restrict assignment of the Installer role strictly to trusted personnel and regularly review role assignments to minimize exposure. 2. Implement robust authentication mechanisms, including multi-factor authentication, to protect Installer accounts from compromise. 3. Monitor and audit access logs for unusual directory access or modification activities by Installer role users to detect potential exploitation attempts. 4. Apply network segmentation and access controls to limit network exposure of Relion REB500 devices, reducing the attack surface. 5. Coordinate with Hitachi Energy for timely receipt and deployment of official patches or firmware updates addressing this vulnerability. 6. Employ intrusion detection systems tailored to detect anomalous behavior related to directory access or privilege misuse on these devices. 7. Conduct regular security assessments and penetration testing focused on privilege boundaries within critical control systems. 8. Develop and enforce strict change management policies to detect unauthorized configuration changes promptly. These steps go beyond generic advice by focusing on role management, monitoring, and network controls specific to the affected product and environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Hitachi Energy
Date Reserved
2026-02-13T11:08:24.044Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699daf6bbe58cf853bdddd62

Added to database: 2/24/2026, 2:02:19 PM

Last enriched: 2/24/2026, 2:16:43 PM

Last updated: 2/25/2026, 12:13:12 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats