Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61861: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT

0
High
VulnerabilityCVE-2025-61861cvecve-2025-61861
Published: Fri Oct 10 2025 (10/10/2025, 10:54:50 UTC)
Source: CVE Database V5
Vendor/Project: FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.
Product: V-SFT

Description

An out-of-bounds read vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.

AI-Powered Analysis

AILast updated: 10/10/2025, 11:14:01 UTC

Technical Analysis

CVE-2025-61861 is an out-of-bounds read vulnerability identified in the VS6ComFile!load_link_inf function of the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. This vulnerability affects versions 6.2.7.0 and earlier. The flaw arises when the software processes specially crafted V-SFT files, leading to an out-of-bounds read condition. This memory access violation can cause multiple adverse effects: disclosure of sensitive information from memory, abnormal termination of the application (ABEND), and potentially arbitrary code execution. The vulnerability requires local access with user interaction to open the malicious file, which means an attacker must trick a user into opening a crafted file within the vulnerable software environment. The CVSS v3.1 base score is 7.8, indicating high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the potential for exploitation exists given the impact. The vulnerability is particularly concerning for industrial and manufacturing environments where V-SFT is used for automation and control tasks, as arbitrary code execution could lead to operational disruptions or sabotage.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses significant risks. Exploitation could lead to leakage of sensitive operational data, disruption of industrial processes through application crashes, or full compromise of systems via arbitrary code execution. This could result in downtime, safety hazards, intellectual property theft, and damage to reputation. Since V-SFT is specialized software used in industrial settings, affected organizations may face operational interruptions and increased recovery costs. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate insider threats or phishing-based delivery of malicious files. The high confidentiality, integrity, and availability impacts mean that successful exploitation could have severe consequences for business continuity and safety compliance in European industrial environments.

Mitigation Recommendations

1. Monitor FUJI ELECTRIC and Hakko Electronics official channels for patches addressing CVE-2025-61861 and apply them promptly once released. 2. Until patches are available, restrict access to V-SFT software and its associated file types to trusted users only. 3. Implement strict file handling policies to prevent opening untrusted or unsolicited V-SFT files, including user training to recognize suspicious files. 4. Use application whitelisting and endpoint protection solutions to detect and block abnormal behavior related to V-SFT processes. 5. Employ network segmentation to isolate systems running V-SFT from general user environments to reduce the risk of malicious file delivery. 6. Conduct regular audits of file access and monitor logs for unusual activity involving V-SFT files. 7. Consider deploying sandbox environments to analyze suspicious V-SFT files before allowing them on production systems. 8. Enhance user awareness programs focusing on social engineering risks that could lead to opening malicious files.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-10-02T01:59:58.731Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8e768bc5428e10f9f4403

Added to database: 10/10/2025, 11:00:56 AM

Last enriched: 10/10/2025, 11:14:01 AM

Last updated: 10/11/2025, 8:23:20 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats