Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61859: Out-of-bounds Write in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT

0
High
VulnerabilityCVE-2025-61859cvecve-2025-61859
Published: Fri Oct 10 2025 (10/10/2025, 10:33:18 UTC)
Source: CVE Database V5
Vendor/Project: FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.
Product: V-SFT

Description

An out-of-bounds write vulnerability exists in VS6ComFile!CItemDraw::is_motion_tween of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.

AI-Powered Analysis

AILast updated: 10/10/2025, 10:51:46 UTC

Technical Analysis

CVE-2025-61859 is an out-of-bounds write vulnerability identified in the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd., specifically affecting versions 6.2.7.0 and earlier. The vulnerability resides in the VS6ComFile!CItemDraw::is_motion_tween function, which is involved in processing motion tween data within V-SFT files. When a specially crafted V-SFT file is opened, this vulnerability can be triggered, causing the software to write data outside the bounds of allocated memory buffers. This memory corruption can lead to multiple adverse effects, including information disclosure, abnormal system termination (ABEND), and potentially arbitrary code execution. The CVSS v3.1 base score is 7.8, indicating high severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). No known exploits have been reported in the wild as of the publication date. The vulnerability is particularly concerning for environments where V-SFT is used for industrial automation or control systems, as exploitation could disrupt critical processes or lead to unauthorized access to sensitive operational data.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors that utilize V-SFT software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial processes due to abnormal system termination, and potential takeover of affected systems through arbitrary code execution. This could result in operational downtime, safety hazards, financial losses, and damage to reputation. Given the local attack vector and requirement for user interaction, the threat is more likely to materialize through insider threats or targeted attacks involving malicious file delivery. The impact is amplified in sectors where V-SFT is integral to control systems, such as automotive manufacturing, energy production, and chemical processing plants prevalent in countries like Germany, France, and Italy.

Mitigation Recommendations

1. Apply vendor-provided patches or updates for V-SFT as soon as they become available to remediate the vulnerability. 2. Implement strict file handling policies to restrict the opening of V-SFT files from untrusted or unknown sources. 3. Educate users about the risks of opening unsolicited or suspicious V-SFT files to reduce the likelihood of triggering the vulnerability. 4. Employ application whitelisting and sandboxing techniques to isolate V-SFT processes and limit the impact of potential exploitation. 5. Monitor system logs and network traffic for unusual activity related to V-SFT file processing. 6. Conduct regular security assessments and penetration testing focused on industrial control systems to identify and mitigate similar vulnerabilities proactively. 7. Consider network segmentation to isolate systems running V-SFT from general IT networks, reducing exposure to local attacks.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-10-02T01:59:58.731Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8e3e0bc5428e10f97dcc8

Added to database: 10/10/2025, 10:45:52 AM

Last enriched: 10/10/2025, 10:51:46 AM

Last updated: 10/10/2025, 12:18:24 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats