Skip to main content

CVE-2025-58776: Stack-based buffer overflow in KEYENCE CORPORATION KV STUDIO

High
VulnerabilityCVE-2025-58776cvecve-2025-58776
Published: Thu Oct 02 2025 (10/02/2025, 05:50:22 UTC)
Source: CVE Database V5
Vendor/Project: KEYENCE CORPORATION
Product: KV STUDIO

Description

KV Studio versions 12.23 and prior contain a stack-based buffer overflow vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.

AI-Powered Analysis

AILast updated: 10/02/2025, 18:07:13 UTC

Technical Analysis

CVE-2025-58776 is a stack-based buffer overflow vulnerability identified in KEYENCE CORPORATION's KV STUDIO software, specifically affecting versions 12.23 and earlier. KV STUDIO is a programming and configuration tool used primarily for KEYENCE's programmable logic controllers (PLCs) and automation equipment. The vulnerability arises when the software processes a specially crafted file, which can trigger a buffer overflow on the stack. This overflow can overwrite critical memory regions, allowing an attacker to execute arbitrary code within the context of the KV STUDIO application. The CVSS v3.1 base score of 7.8 indicates a high severity level. The vector string (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) reveals that the attack requires local access (AV:L), low attack complexity (AC:L), no privileges (PR:N), but does require user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability's nature suggests that exploitation could lead to full compromise of the affected system, including unauthorized code execution and potential control over connected industrial processes. Given KV STUDIO's role in industrial automation, exploitation could have serious operational consequences.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses significant risks. Exploitation could lead to unauthorized control or disruption of industrial control systems (ICS), causing production downtime, safety hazards, or data breaches. The high impact on confidentiality, integrity, and availability means that sensitive operational data could be exposed or manipulated, and system availability could be compromised, potentially leading to cascading failures in automated processes. Since KV STUDIO is used to program PLCs, an attacker gaining code execution could alter control logic, leading to physical damage or safety incidents. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users may open untrusted files or where attackers have gained initial footholds. The absence of known exploits in the wild suggests a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

European organizations should immediately identify all instances of KV STUDIO version 12.23 or earlier within their environments. Since no patch links are currently provided, organizations should contact KEYENCE CORPORATION for official patches or updates addressing this vulnerability. In the interim, strict controls should be implemented to limit local access to systems running KV STUDIO, including enforcing least privilege principles and restricting file sources to trusted origins only. User training should emphasize the risks of opening files from unverified sources to mitigate the user interaction requirement. Network segmentation should isolate engineering workstations running KV STUDIO from broader corporate and operational networks to reduce lateral movement opportunities. Additionally, monitoring for anomalous behavior on systems running KV STUDIO, such as unexpected process executions or memory anomalies, can provide early detection of exploitation attempts. Organizations should also review and enhance endpoint protection measures with behavior-based detection capabilities tailored to industrial software environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-09-04T23:51:55.196Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68debf28f18dd408beac4844

Added to database: 10/2/2025, 6:06:32 PM

Last enriched: 10/2/2025, 6:07:13 PM

Last updated: 10/2/2025, 6:43:41 PM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats