CVE-2025-47752: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6ComFile!MakeItemGlidZahyou function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-47752 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write in the function VS6ComFile!MakeItemGlidZahyou. This function processes V7 or V8 file formats, and when a specially crafted file of these types is opened, it can trigger the vulnerability. The out-of-bounds write can lead to multiple adverse outcomes including application crashes, information disclosure, and potentially arbitrary code execution. The CVSS 3.1 base score is 7.8, indicating a high impact. The attack vector is local (AV:L), meaning an attacker needs local access to the system, but no privileges are required (PR:N). User interaction is required (UI:R), so the victim must open the malicious file. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This vulnerability is critical for environments where V-SFT is used to process or analyze V7 or V8 files, as exploitation could allow attackers to execute arbitrary code with the privileges of the user running the software. No known exploits are reported in the wild yet, but the vulnerability's nature suggests that once weaponized, it could be leveraged for significant compromise.
Potential Impact
For European organizations using FUJI ELECTRIC's V-SFT software, particularly in industrial automation, manufacturing, or energy sectors where such software is commonly deployed, this vulnerability poses a significant risk. Exploitation could lead to operational disruptions due to crashes, leakage of sensitive information processed by V-SFT, and full compromise of affected systems through arbitrary code execution. Given the criticality of industrial control systems in Europe’s manufacturing and energy infrastructure, successful exploitation could impact production lines, safety systems, and data integrity. The local attack vector and requirement for user interaction reduce the risk somewhat, but insider threats or targeted spear-phishing campaigns delivering malicious V7/V8 files could enable exploitation. The high impact on confidentiality, integrity, and availability makes this vulnerability particularly concerning for organizations with strict regulatory compliance requirements such as GDPR and NIS Directive, where data breaches or operational downtime can lead to severe penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately identify all instances of V-SFT software version 6.2.5.0 and earlier within their environments. Since no patch links are currently available, organizations should implement the following mitigations: 1) Restrict access to V-SFT software to trusted users only and limit the ability to open V7 or V8 files from untrusted sources. 2) Implement strict file validation and scanning for V7/V8 files before they are opened in V-SFT, using endpoint protection solutions capable of detecting malformed or malicious files. 3) Employ application whitelisting and sandboxing techniques to contain the impact of potential exploitation. 4) Educate users about the risks of opening unsolicited or unexpected V7/V8 files, emphasizing the need for caution and verification. 5) Monitor system logs and behavior for signs of crashes or anomalous activity related to V-SFT processes. 6) Once a vendor patch is released, prioritize immediate deployment after testing. 7) Consider network segmentation to isolate systems running V-SFT from critical infrastructure to limit lateral movement in case of compromise.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2025-47752: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. V-SFT
Description
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds write in VS6ComFile!MakeItemGlidZahyou function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-47752 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability arises from an out-of-bounds write in the function VS6ComFile!MakeItemGlidZahyou. This function processes V7 or V8 file formats, and when a specially crafted file of these types is opened, it can trigger the vulnerability. The out-of-bounds write can lead to multiple adverse outcomes including application crashes, information disclosure, and potentially arbitrary code execution. The CVSS 3.1 base score is 7.8, indicating a high impact. The attack vector is local (AV:L), meaning an attacker needs local access to the system, but no privileges are required (PR:N). User interaction is required (UI:R), so the victim must open the malicious file. The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). This vulnerability is critical for environments where V-SFT is used to process or analyze V7 or V8 files, as exploitation could allow attackers to execute arbitrary code with the privileges of the user running the software. No known exploits are reported in the wild yet, but the vulnerability's nature suggests that once weaponized, it could be leveraged for significant compromise.
Potential Impact
For European organizations using FUJI ELECTRIC's V-SFT software, particularly in industrial automation, manufacturing, or energy sectors where such software is commonly deployed, this vulnerability poses a significant risk. Exploitation could lead to operational disruptions due to crashes, leakage of sensitive information processed by V-SFT, and full compromise of affected systems through arbitrary code execution. Given the criticality of industrial control systems in Europe’s manufacturing and energy infrastructure, successful exploitation could impact production lines, safety systems, and data integrity. The local attack vector and requirement for user interaction reduce the risk somewhat, but insider threats or targeted spear-phishing campaigns delivering malicious V7/V8 files could enable exploitation. The high impact on confidentiality, integrity, and availability makes this vulnerability particularly concerning for organizations with strict regulatory compliance requirements such as GDPR and NIS Directive, where data breaches or operational downtime can lead to severe penalties and reputational damage.
Mitigation Recommendations
European organizations should immediately identify all instances of V-SFT software version 6.2.5.0 and earlier within their environments. Since no patch links are currently available, organizations should implement the following mitigations: 1) Restrict access to V-SFT software to trusted users only and limit the ability to open V7 or V8 files from untrusted sources. 2) Implement strict file validation and scanning for V7/V8 files before they are opened in V-SFT, using endpoint protection solutions capable of detecting malformed or malicious files. 3) Employ application whitelisting and sandboxing techniques to contain the impact of potential exploitation. 4) Educate users about the risks of opening unsolicited or unexpected V7/V8 files, emphasizing the need for caution and verification. 5) Monitor system logs and behavior for signs of crashes or anomalous activity related to V-SFT processes. 6) Once a vendor patch is released, prioritize immediate deployment after testing. 7) Consider network segmentation to isolate systems running V-SFT from critical infrastructure to limit lateral movement in case of compromise.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-05-09T08:06:34.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb5ea
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 6:02:43 PM
Last updated: 7/31/2025, 8:14:01 PM
Views: 18
Related Threats
CVE-2025-26398: CWE-798 Use of Hard-coded Credentials in SolarWinds Database Performance Analyzer
MediumCVE-2025-41686: CWE-306 Missing Authentication for Critical Function in Phoenix Contact DaUM
HighCVE-2025-8874: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litonice13 Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations
MediumCVE-2025-8767: CWE-1236 Improper Neutralization of Formula Elements in a CSV File in anwppro AnWP Football Leagues
MediumCVE-2025-8482: CWE-862 Missing Authorization in 10up Simple Local Avatars
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.