CVE-2025-47760: Stack-based buffer overflow in FUJI ELECTRIC CO., LTD. V-SFT
V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6MemInIF!set_temp_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-47760 is a high-severity stack-based buffer overflow vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability resides in the function VS6MemInIF!set_temp_type_default, which improperly handles input when opening specially crafted V7 or V8 project files. Exploitation occurs when a maliciously crafted file is opened by the vulnerable software, leading to a stack buffer overflow. This overflow can cause the application to crash, potentially disclose sensitive information from memory, or allow an attacker to execute arbitrary code with the privileges of the user running the software. The CVSS 3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) shows that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) to open the malicious file. The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability's nature makes it a significant risk, especially in industrial or critical infrastructure environments where V-SFT is used for programming or configuring automation systems. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a substantial risk. V-SFT is used for programming and configuring programmable logic controllers (PLCs) and other automation devices, which are integral to operational technology (OT) environments. Successful exploitation could lead to unauthorized code execution, potentially disrupting manufacturing processes, causing equipment malfunctions, or leaking sensitive operational data. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insiders or attackers with physical or remote desktop access could exploit the flaw. The high impact on confidentiality, integrity, and availability means that exploitation could result in operational downtime, safety hazards, and loss of intellectual property. Given the interconnectedness of IT and OT systems in many European industries, a compromise in V-SFT could serve as a pivot point for broader network intrusion.
Mitigation Recommendations
Organizations should immediately identify all instances of V-SFT version 6.2.5.0 and earlier within their environments. Until an official patch is released by FUJI ELECTRIC CO., LTD., the following specific mitigations are recommended: 1) Restrict access to systems running V-SFT to trusted personnel only, minimizing the risk of malicious file opening. 2) Implement strict file handling policies, including disabling the opening of untrusted or unsolicited V7/V8 project files. 3) Employ application whitelisting and endpoint protection solutions that can detect and block exploitation attempts or anomalous behavior in V-SFT processes. 4) Use network segmentation to isolate OT systems running V-SFT from general IT networks, reducing the attack surface. 5) Monitor logs and system behavior for crashes or unusual activity related to V-SFT usage. 6) Prepare for rapid deployment of patches once available by establishing communication channels with FUJI ELECTRIC and subscribing to vulnerability advisories. 7) Conduct user training to raise awareness about the risks of opening untrusted files in V-SFT.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Sweden, Poland, Spain, Czech Republic
CVE-2025-47760: Stack-based buffer overflow in FUJI ELECTRIC CO., LTD. V-SFT
Description
V-SFT v6.2.5.0 and earlier contains an issue with stack-based buffer overflow in VS6MemInIF!set_temp_type_default function. Opening specially crafted V7 or V8 files may lead to crash, information disclosure, and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-47760 is a high-severity stack-based buffer overflow vulnerability affecting FUJI ELECTRIC CO., LTD.'s V-SFT software, specifically versions 6.2.5.0 and earlier. The vulnerability resides in the function VS6MemInIF!set_temp_type_default, which improperly handles input when opening specially crafted V7 or V8 project files. Exploitation occurs when a maliciously crafted file is opened by the vulnerable software, leading to a stack buffer overflow. This overflow can cause the application to crash, potentially disclose sensitive information from memory, or allow an attacker to execute arbitrary code with the privileges of the user running the software. The CVSS 3.1 base score is 7.8, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) shows that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but user interaction (UI:R) to open the malicious file. The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits are currently reported in the wild, but the vulnerability's nature makes it a significant risk, especially in industrial or critical infrastructure environments where V-SFT is used for programming or configuring automation systems. The lack of available patches at the time of publication increases the urgency for mitigation.
Potential Impact
For European organizations, especially those in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a substantial risk. V-SFT is used for programming and configuring programmable logic controllers (PLCs) and other automation devices, which are integral to operational technology (OT) environments. Successful exploitation could lead to unauthorized code execution, potentially disrupting manufacturing processes, causing equipment malfunctions, or leaking sensitive operational data. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, as insiders or attackers with physical or remote desktop access could exploit the flaw. The high impact on confidentiality, integrity, and availability means that exploitation could result in operational downtime, safety hazards, and loss of intellectual property. Given the interconnectedness of IT and OT systems in many European industries, a compromise in V-SFT could serve as a pivot point for broader network intrusion.
Mitigation Recommendations
Organizations should immediately identify all instances of V-SFT version 6.2.5.0 and earlier within their environments. Until an official patch is released by FUJI ELECTRIC CO., LTD., the following specific mitigations are recommended: 1) Restrict access to systems running V-SFT to trusted personnel only, minimizing the risk of malicious file opening. 2) Implement strict file handling policies, including disabling the opening of untrusted or unsolicited V7/V8 project files. 3) Employ application whitelisting and endpoint protection solutions that can detect and block exploitation attempts or anomalous behavior in V-SFT processes. 4) Use network segmentation to isolate OT systems running V-SFT from general IT networks, reducing the attack surface. 5) Monitor logs and system behavior for crashes or unusual activity related to V-SFT usage. 6) Prepare for rapid deployment of patches once available by establishing communication channels with FUJI ELECTRIC and subscribing to vulnerability advisories. 7) Conduct user training to raise awareness about the risks of opening untrusted files in V-SFT.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-05-09T08:06:34.550Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb5bd
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 5:47:06 PM
Last updated: 7/30/2025, 4:07:42 PM
Views: 12
Related Threats
CVE-2025-43735: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-40770: CWE-300: Channel Accessible by Non-Endpoint in Siemens SINEC Traffic Analyzer
HighCVE-2025-40769: CWE-1164: Irrelevant Code in Siemens SINEC Traffic Analyzer
HighCVE-2025-40768: CWE-200: Exposure of Sensitive Information to an Unauthorized Actor in Siemens SINEC Traffic Analyzer
HighCVE-2025-40767: CWE-250: Execution with Unnecessary Privileges in Siemens SINEC Traffic Analyzer
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.