Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61862: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT

0
High
VulnerabilityCVE-2025-61862cvecve-2025-61862
Published: Fri Oct 10 2025 (10/10/2025, 10:58:05 UTC)
Source: CVE Database V5
Vendor/Project: FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.
Product: V-SFT

Description

An out-of-bounds read vulnerability exists in VS6ComFile!get_ovlp_element_size of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.

AI-Powered Analysis

AILast updated: 10/10/2025, 11:13:50 UTC

Technical Analysis

CVE-2025-61862 is an out-of-bounds read vulnerability identified in the VS6ComFile!get_ovlp_element_size function within the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd. This vulnerability affects versions 6.2.7.0 and earlier. The flaw arises when the software processes specially crafted V-SFT files, leading to an out-of-bounds read condition. This memory access error can cause several adverse effects: information disclosure due to reading unintended memory areas, abnormal system termination (ABEND), and potentially arbitrary code execution if exploited skillfully. The vulnerability has a CVSS 3.1 base score of 7.8, reflecting high severity. The attack vector is local (AV:L), requiring the attacker to have local access to the system and to induce a user interaction (UI:R) such as opening a malicious file. No privileges are required (PR:N), and the scope is unchanged (S:U). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk, especially in industrial environments where V-SFT is used for automation and control. The lack of available patches at the time of reporting necessitates immediate risk mitigation strategies. The vulnerability's exploitation could allow attackers to gain unauthorized access to sensitive information, disrupt critical industrial processes, or execute arbitrary code, potentially leading to broader system compromise.

Potential Impact

For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors that utilize V-SFT software, this vulnerability presents a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial control processes through system crashes, and potential full system compromise via arbitrary code execution. Such impacts could result in operational downtime, financial losses, safety hazards, and damage to organizational reputation. Given the reliance on V-SFT in automation systems, attacks could cascade, affecting supply chains and critical services. The requirement for local access and user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where insiders or compromised endpoints exist. The high confidentiality, integrity, and availability impacts underscore the criticality of addressing this vulnerability promptly to maintain operational continuity and data security within European industrial sectors.

Mitigation Recommendations

1. Monitor vendor communications closely and apply official patches or updates for V-SFT as soon as they become available. 2. Until patches are released, restrict the opening of V-SFT files to trusted sources only; implement strict file validation and scanning policies. 3. Limit user permissions on systems running V-SFT to reduce the risk of local exploitation and prevent unauthorized file execution. 4. Employ application whitelisting and endpoint detection and response (EDR) solutions to detect anomalous behaviors related to V-SFT processes. 5. Conduct user awareness training to prevent inadvertent opening of malicious files, emphasizing the risks of interacting with untrusted V-SFT files. 6. Isolate critical industrial control systems from general IT networks to minimize the risk of lateral movement by attackers. 7. Implement robust logging and monitoring to detect abnormal application crashes or suspicious activity indicative of exploitation attempts. 8. Review and harden system configurations to minimize attack surface, including disabling unnecessary services and enforcing strict access controls on affected systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-10-02T01:59:58.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8e768bc5428e10f9f4407

Added to database: 10/10/2025, 11:00:56 AM

Last enriched: 10/10/2025, 11:13:50 AM

Last updated: 10/11/2025, 9:12:07 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats