CVE-2025-47750: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6MemInIF!set_temp_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-47750 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write issue in the function VS6MemInIF!set_temp_type_default. This flaw is triggered when the software opens specially crafted V7 or V8 files. Exploitation of this vulnerability can lead to multiple severe consequences including application crashes, information disclosure, and arbitrary code execution. The vulnerability has a CVSS v3.1 base score of 7.8, indicating a high level of risk. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but no privileges are required (PR:N). User interaction is necessary (UI:R), implying that a user must open or interact with a malicious file. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the potential for exploitation exists given the nature of the vulnerability. The vulnerability affects a critical industrial software product used for automation and control, which may be integral to operational technology environments. The lack of available patches at the time of publication increases the urgency for mitigation and risk management.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, energy, and infrastructure that rely on FUJI ELECTRIC's V-SFT software for programmable logic controller (PLC) programming and automation, this vulnerability poses a significant threat. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial processes through crashes or manipulation, and potentially full system compromise via arbitrary code execution. This could result in operational downtime, safety hazards, financial losses, and damage to reputation. Given the critical nature of industrial control systems in Europe’s manufacturing and energy sectors, the impact extends beyond IT to physical safety and regulatory compliance. Organizations with local access environments where users handle V7 or V8 files are particularly at risk, as the attack requires user interaction to open malicious files. The high confidentiality, integrity, and availability impacts underscore the potential for severe operational disruption and data breaches.
Mitigation Recommendations
European organizations should implement several targeted mitigation strategies: 1) Immediately inventory and identify all instances of V-SFT software version 6.2.5.0 or earlier in their environment. 2) Restrict local access to systems running V-SFT to trusted personnel only, minimizing the risk of malicious file introduction. 3) Educate users on the risks of opening untrusted V7 or V8 files and enforce strict file handling policies. 4) Employ application whitelisting and endpoint protection solutions that can detect and block anomalous behavior related to file parsing and memory corruption attempts. 5) Monitor system logs and network activity for signs of exploitation attempts or unusual crashes. 6) Engage with FUJI ELECTRIC for timely patch releases or workarounds and apply updates as soon as they become available. 7) Consider network segmentation to isolate industrial control systems from general IT networks, reducing the attack surface. 8) Implement strict file integrity monitoring and use sandboxing techniques to analyze suspicious files before opening them in production environments.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2025-47750: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
Description
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6MemInIF!set_temp_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-47750 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write issue in the function VS6MemInIF!set_temp_type_default. This flaw is triggered when the software opens specially crafted V7 or V8 files. Exploitation of this vulnerability can lead to multiple severe consequences including application crashes, information disclosure, and arbitrary code execution. The vulnerability has a CVSS v3.1 base score of 7.8, indicating a high level of risk. The attack vector is local (AV:L), meaning the attacker must have local access to the system, but no privileges are required (PR:N). User interaction is necessary (UI:R), implying that a user must open or interact with a malicious file. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the potential for exploitation exists given the nature of the vulnerability. The vulnerability affects a critical industrial software product used for automation and control, which may be integral to operational technology environments. The lack of available patches at the time of publication increases the urgency for mitigation and risk management.
Potential Impact
For European organizations, particularly those in industrial sectors such as manufacturing, energy, and infrastructure that rely on FUJI ELECTRIC's V-SFT software for programmable logic controller (PLC) programming and automation, this vulnerability poses a significant threat. Successful exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial processes through crashes or manipulation, and potentially full system compromise via arbitrary code execution. This could result in operational downtime, safety hazards, financial losses, and damage to reputation. Given the critical nature of industrial control systems in Europe’s manufacturing and energy sectors, the impact extends beyond IT to physical safety and regulatory compliance. Organizations with local access environments where users handle V7 or V8 files are particularly at risk, as the attack requires user interaction to open malicious files. The high confidentiality, integrity, and availability impacts underscore the potential for severe operational disruption and data breaches.
Mitigation Recommendations
European organizations should implement several targeted mitigation strategies: 1) Immediately inventory and identify all instances of V-SFT software version 6.2.5.0 or earlier in their environment. 2) Restrict local access to systems running V-SFT to trusted personnel only, minimizing the risk of malicious file introduction. 3) Educate users on the risks of opening untrusted V7 or V8 files and enforce strict file handling policies. 4) Employ application whitelisting and endpoint protection solutions that can detect and block anomalous behavior related to file parsing and memory corruption attempts. 5) Monitor system logs and network activity for signs of exploitation attempts or unusual crashes. 6) Engage with FUJI ELECTRIC for timely patch releases or workarounds and apply updates as soon as they become available. 7) Consider network segmentation to isolate industrial control systems from general IT networks, reducing the attack surface. 8) Implement strict file integrity monitoring and use sandboxing techniques to analyze suspicious files before opening them in production environments.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-05-09T08:06:34.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb5e6
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:02:13 PM
Last updated: 8/13/2025, 5:41:06 AM
Views: 16
Related Threats
CVE-2025-55197: CWE-400: Uncontrolled Resource Consumption in py-pdf pypdf
MediumCVE-2025-8929: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-8928: SQL Injection in code-projects Medical Store Management System
MediumCVE-2025-34154: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Synergetic Data Systems Inc. UnForm Server Manager
CriticalCVE-2025-8927: Improper Restriction of Excessive Authentication Attempts in mtons mblog
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.