CVE-2025-47756: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. V-SFT
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!CGamenDataRom::set_mr400_strc function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-47756 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The flaw exists in the VS6EditData!CGamenDataRom::set_mr400_strc function, which improperly handles input when opening specially crafted V7 or V8 files. This results in an out-of-bounds read condition, a memory safety issue where the software reads data outside the allocated buffer boundaries. Exploiting this vulnerability can cause the application to crash, potentially leading to denial of service. More critically, it can lead to information disclosure by reading sensitive memory contents and may allow arbitrary code execution, enabling an attacker to run malicious code within the context of the vulnerable application. The CVSS 3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability's nature suggests it could be leveraged in targeted attacks. The vulnerability affects the V-SFT software, which is used primarily in industrial automation and control systems, particularly in environments where Fuji Electric products are deployed. The lack of available patches at the time of publication underscores the need for immediate mitigation efforts by users of affected versions.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially those operating in critical infrastructure sectors such as manufacturing, energy, and utilities where Fuji Electric's V-SFT software is deployed for industrial automation and control. Exploitation could lead to operational disruptions due to crashes (denial of service), unauthorized disclosure of sensitive operational data, and potentially full system compromise through arbitrary code execution. This could result in production downtime, safety risks, intellectual property theft, and regulatory compliance violations under frameworks like NIS2 and GDPR if personal or sensitive data is exposed. The requirement for local access and user interaction somewhat limits remote exploitation but insider threats or compromised internal systems could be leveraged by attackers. The high impact on confidentiality, integrity, and availability means that successful exploitation could have cascading effects on industrial processes and supply chains within European organizations.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to systems running V-SFT to trusted personnel only, minimizing the risk of local exploitation. 2. Implement strict user privilege controls and ensure that only authorized users can open or handle V7 or V8 files within the application. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for unusual behavior indicative of exploitation attempts. 4. Conduct thorough network segmentation to isolate industrial control systems running V-SFT from general IT networks, reducing attack surface exposure. 5. Regularly audit and monitor logs for crashes or anomalous activity related to V-SFT usage. 6. Engage with Fuji Electric for updates and patches; prioritize patch deployment once available. 7. Educate users on the risks of opening untrusted files and enforce policies to prevent the use of unauthorized files in the V-SFT environment. 8. Consider deploying virtualized or sandboxed environments for file handling to contain potential exploitation.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Finland
CVE-2025-47756: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. V-SFT
Description
V-SFT v6.2.5.0 and earlier contains an issue with out-of-bounds read in VS6EditData!CGamenDataRom::set_mr400_strc function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-47756 is a high-severity vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The flaw exists in the VS6EditData!CGamenDataRom::set_mr400_strc function, which improperly handles input when opening specially crafted V7 or V8 files. This results in an out-of-bounds read condition, a memory safety issue where the software reads data outside the allocated buffer boundaries. Exploiting this vulnerability can cause the application to crash, potentially leading to denial of service. More critically, it can lead to information disclosure by reading sensitive memory contents and may allow arbitrary code execution, enabling an attacker to run malicious code within the context of the vulnerable application. The CVSS 3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), and user interaction (UI:R). The scope is unchanged (S:U), but the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability's nature suggests it could be leveraged in targeted attacks. The vulnerability affects the V-SFT software, which is used primarily in industrial automation and control systems, particularly in environments where Fuji Electric products are deployed. The lack of available patches at the time of publication underscores the need for immediate mitigation efforts by users of affected versions.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially those operating in critical infrastructure sectors such as manufacturing, energy, and utilities where Fuji Electric's V-SFT software is deployed for industrial automation and control. Exploitation could lead to operational disruptions due to crashes (denial of service), unauthorized disclosure of sensitive operational data, and potentially full system compromise through arbitrary code execution. This could result in production downtime, safety risks, intellectual property theft, and regulatory compliance violations under frameworks like NIS2 and GDPR if personal or sensitive data is exposed. The requirement for local access and user interaction somewhat limits remote exploitation but insider threats or compromised internal systems could be leveraged by attackers. The high impact on confidentiality, integrity, and availability means that successful exploitation could have cascading effects on industrial processes and supply chains within European organizations.
Mitigation Recommendations
1. Immediate mitigation should include restricting access to systems running V-SFT to trusted personnel only, minimizing the risk of local exploitation. 2. Implement strict user privilege controls and ensure that only authorized users can open or handle V7 or V8 files within the application. 3. Employ application whitelisting and endpoint detection and response (EDR) solutions to monitor for unusual behavior indicative of exploitation attempts. 4. Conduct thorough network segmentation to isolate industrial control systems running V-SFT from general IT networks, reducing attack surface exposure. 5. Regularly audit and monitor logs for crashes or anomalous activity related to V-SFT usage. 6. Engage with Fuji Electric for updates and patches; prioritize patch deployment once available. 7. Educate users on the risks of opening untrusted files and enforce policies to prevent the use of unauthorized files in the V-SFT environment. 8. Consider deploying virtualized or sandboxed environments for file handling to contain potential exploitation.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-05-09T08:06:34.549Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb71c
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 7:32:43 PM
Last updated: 8/12/2025, 6:34:53 AM
Views: 11
Related Threats
CVE-2025-9025: SQL Injection in code-projects Simple Cafe Ordering System
MediumCVE-2025-9024: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2025-9023: Buffer Overflow in Tenda AC7
HighCVE-2025-8905: CWE-94 Improper Control of Generation of Code ('Code Injection') in inpersttion Inpersttion For Theme
MediumCVE-2025-8720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in morehawes Plugin README Parser
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.