CVE-2025-47751: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-47751 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write issue within the VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. This function processes V7 or V8 files, and when it opens specially crafted files, it may trigger a memory corruption condition. The out-of-bounds write can lead to multiple adverse effects including application crashes, potential information disclosure, and arbitrary code execution. The vulnerability is exploitable locally (AV:L) with low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R) to open the malicious file. The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker could potentially execute arbitrary code with the privileges of the user running V-SFT, leading to full compromise of the affected system. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its high CVSS score (7.8) indicate a significant risk once exploit code becomes available. The vulnerability affects a specialized industrial software product used for automation or control systems, which may be critical in manufacturing or industrial environments.
Potential Impact
For European organizations, especially those in manufacturing, industrial automation, or critical infrastructure sectors that utilize FUJI ELECTRIC's V-SFT software, this vulnerability poses a serious threat. Exploitation could lead to operational disruptions due to crashes or system compromise, potentially halting production lines or causing safety system failures. Information disclosure could expose sensitive operational data or intellectual property. Arbitrary code execution could allow attackers to implant malware, move laterally within networks, or disrupt industrial control processes. Given the high impact on confidentiality, integrity, and availability, organizations may face financial losses, regulatory penalties, and reputational damage. The requirement for user interaction (opening a malicious file) means that social engineering or phishing could be vectors for exploitation, increasing the risk in environments where users handle V7 or V8 files regularly.
Mitigation Recommendations
European organizations should prioritize upgrading V-SFT to versions later than 6.2.5.0 once patches are released by FUJI ELECTRIC. Until patches are available, implement strict controls on the handling of V7 and V8 files, including disabling the opening of files from untrusted sources and enforcing file integrity checks. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Educate users on the risks of opening unsolicited or suspicious files, particularly those related to V-SFT. Network segmentation should be applied to isolate systems running V-SFT from broader enterprise networks to reduce lateral movement opportunities. Monitoring for abnormal application behavior or crashes can help detect exploitation attempts early. Additionally, maintain up-to-date backups and incident response plans tailored to industrial control environments to ensure rapid recovery if compromise occurs.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden
CVE-2025-47751: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
Description
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-47751 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write issue within the VS6EditData!CDataRomErrorCheck::MacroCommandCheck function. This function processes V7 or V8 files, and when it opens specially crafted files, it may trigger a memory corruption condition. The out-of-bounds write can lead to multiple adverse effects including application crashes, potential information disclosure, and arbitrary code execution. The vulnerability is exploitable locally (AV:L) with low attack complexity (AC:L), does not require privileges (PR:N), but does require user interaction (UI:R) to open the malicious file. The scope remains unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This means an attacker could potentially execute arbitrary code with the privileges of the user running V-SFT, leading to full compromise of the affected system. Although no known exploits are currently reported in the wild, the nature of the vulnerability and its high CVSS score (7.8) indicate a significant risk once exploit code becomes available. The vulnerability affects a specialized industrial software product used for automation or control systems, which may be critical in manufacturing or industrial environments.
Potential Impact
For European organizations, especially those in manufacturing, industrial automation, or critical infrastructure sectors that utilize FUJI ELECTRIC's V-SFT software, this vulnerability poses a serious threat. Exploitation could lead to operational disruptions due to crashes or system compromise, potentially halting production lines or causing safety system failures. Information disclosure could expose sensitive operational data or intellectual property. Arbitrary code execution could allow attackers to implant malware, move laterally within networks, or disrupt industrial control processes. Given the high impact on confidentiality, integrity, and availability, organizations may face financial losses, regulatory penalties, and reputational damage. The requirement for user interaction (opening a malicious file) means that social engineering or phishing could be vectors for exploitation, increasing the risk in environments where users handle V7 or V8 files regularly.
Mitigation Recommendations
European organizations should prioritize upgrading V-SFT to versions later than 6.2.5.0 once patches are released by FUJI ELECTRIC. Until patches are available, implement strict controls on the handling of V7 and V8 files, including disabling the opening of files from untrusted sources and enforcing file integrity checks. Employ application whitelisting and sandboxing techniques to limit the impact of potential exploitation. Educate users on the risks of opening unsolicited or suspicious files, particularly those related to V-SFT. Network segmentation should be applied to isolate systems running V-SFT from broader enterprise networks to reduce lateral movement opportunities. Monitoring for abnormal application behavior or crashes can help detect exploitation attempts early. Additionally, maintain up-to-date backups and incident response plans tailored to industrial control environments to ensure rapid recovery if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-05-09T08:06:34.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb5e8
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:02:27 PM
Last updated: 7/30/2025, 4:07:40 PM
Views: 14
Related Threats
CVE-2025-8834: Cross Site Scripting in JCG Link-net LW-N915R
MediumCVE-2025-55159: CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer in tokio-rs slab
MediumCVE-2025-55161: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighCVE-2025-25235: CWE-918 Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway
HighCVE-2025-55151: CWE-918: Server-Side Request Forgery (SSRF) in Stirling-Tools Stirling-PDF
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.