Skip to main content

CVE-2025-47751: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT

High
VulnerabilityCVE-2025-47751cvecve-2025-47751
Published: Mon May 19 2025 (05/19/2025, 07:44:36 UTC)
Source: CVE
Vendor/Project: FUJI ELECTRIC CO., LTD.
Product: V-SFT

Description

V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.

AI-Powered Analysis

AILast updated: 07/11/2025, 18:02:27 UTC

Technical Analysis

CVE-2025-47751 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write issue within the VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. This function processes V7 or V8 files, and when it opens specially crafted files, it may trigger a memory corruption condition. The out-of-bounds write can lead to multiple adverse effects including application crashes, potential information disclosure, and arbitrary code execution. The vulnerability is exploitable locally (AV:L) with low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R) to open the malicious file. The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker could potentially execute arbitrary code with the privileges of the user running V-SFT, leading to full compromise of the affected system. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its high CVSS score (7.8) indicate a significant risk once exploit code becomes available. The vulnerability affects a specialized industrial software product used for automation or control systems, which may be critical in manufacturing or industrial environments.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, or critical infrastructure sectors that utilize FUJI ELECTRIC's V-SFT software, this vulnerability poses a serious threat. Exploitation could lead to operational disruptions due to crashes or system compromise, potentially halting production lines or causing safety system failures. Information disclosure could expose sensitive operational data or intellectual property. Arbitrary code execution could allow attackers to implant malware, move laterally within networks, or disrupt industrial control processes. Given the high impact on confidentiality, integrity, and availability, organizations may face financial losses, regulatory penalties, and reputational damage. The requirement for user interaction (opening a malicious file) means that social engineering or phishing could be vectors for exploitation, increasing the risk in environments where users handle V7 or V8 files regularly.

Mitigation Recommendations

European organizations should prioritize upgrading V-SFT to versions later than 6.2.5.0 once patches are released by FUJI ELECTRIC. Until patches are available, implement strict controls on the handling of V7 and V8 files, including disabling the opening of files from untrusted sources and enforcing file integrity checks. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Educate users on the risks of opening unsolicited or suspicious files, particularly those related to V-SFT. Network segmentation should be applied to isolate systems running V-SFT from broader enterprise networks to reduce lateral movement opportunities. Monitoring for abnormal application behavior or crashes can help detect exploitation attempts early. Additionally, maintain up-to-date backups and incident response plans tailored to industrial control environments to ensure rapid recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-05-09T08:06:34.549Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0f81484d88663aeb5e8

Added to database: 5/20/2025, 6:59:04 PM

Last enriched: 7/11/2025, 6:02:27 PM

Last updated: 7/30/2025, 4:07:40 PM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats