Skip to main content

CVE-2025-49848: CWE-787 Out-of-bounds Write in LS Electric GMWin 4

High
VulnerabilityCVE-2025-49848cvecve-2025-49848cwe-787
Published: Tue Jun 17 2025 (06/17/2025, 18:31:45 UTC)
Source: CVE Database V5
Vendor/Project: LS Electric
Product: GMWin 4

Description

An Out-of-bounds Write vulnerability exists within the parsing of PRJ files. The issues result from the lack of proper validation of user-supplied data, which can result in different memory corruption issues within the application, such as reading and writing past the end of allocated data structures.

AI-Powered Analysis

AILast updated: 06/17/2025, 19:04:59 UTC

Technical Analysis

CVE-2025-49848 is a high-severity vulnerability identified in LS Electric's GMWin 4 software, specifically version 4.18. The vulnerability is classified as an out-of-bounds write (CWE-787) occurring during the parsing of PRJ project files. This flaw arises due to insufficient validation of user-supplied data within the file parser, allowing the application to read and write beyond the allocated memory boundaries. Such memory corruption can lead to unpredictable behavior including application crashes, data corruption, or potentially arbitrary code execution. The vulnerability does not require privileges or authentication to exploit but does require user interaction, such as opening a crafted PRJ file. The CVSS 4.0 score is 8.4 (high), reflecting the significant impact on confidentiality, integrity, and availability, with local attack vector and low attack complexity. The vulnerability affects the core functionality of GMWin 4, a software used for programming and configuring industrial control systems (ICS) and automation equipment manufactured by LS Electric. Given the critical role of GMWin in industrial environments, exploitation could disrupt industrial processes or cause safety hazards. No known exploits are currently reported in the wild, and no official patches have been released yet. The vulnerability is notable for its potential to compromise the integrity and availability of industrial control systems through memory corruption triggered by maliciously crafted project files.

Potential Impact

For European organizations, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors, this vulnerability poses a substantial risk. GMWin 4 is used to configure programmable logic controllers (PLCs) and other control devices that manage critical industrial processes. Exploitation could lead to unauthorized code execution or system crashes, resulting in operational downtime, safety incidents, or loss of sensitive operational data. The high impact on confidentiality, integrity, and availability means that attackers could manipulate control logic or disrupt production lines, causing financial losses and safety risks. Since the attack vector is local with user interaction, social engineering or insider threats could be leveraged to trigger the vulnerability. The lack of authentication requirement increases the risk if attackers gain access to systems where GMWin is installed. European organizations with automated manufacturing plants or critical infrastructure relying on LS Electric products are particularly vulnerable, potentially affecting supply chains and industrial output.

Mitigation Recommendations

Organizations should immediately audit their use of GMWin 4, specifically version 4.18, and restrict access to systems running this software to trusted personnel only. Until a vendor patch is released, implement strict file handling policies to prevent opening untrusted or unsolicited PRJ files. Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior related to memory corruption. Network segmentation should isolate engineering workstations running GMWin from broader corporate and operational networks to limit exposure. Regular backups of project files and configurations should be maintained to enable recovery in case of corruption. Additionally, user training to recognize phishing or social engineering attempts can reduce the risk of malicious file opening. Monitoring and logging of GMWin usage and file access can help detect suspicious activity early. Engage with LS Electric support channels to obtain updates on patches or workarounds and apply them promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-06-11T15:07:28.495Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6851b8bca8c9212743861093

Added to database: 6/17/2025, 6:49:32 PM

Last enriched: 6/17/2025, 7:04:59 PM

Last updated: 8/3/2025, 4:18:41 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats