Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61863: Out-of-bounds Read in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT

0
High
VulnerabilityCVE-2025-61863cvecve-2025-61863
Published: Fri Oct 10 2025 (10/10/2025, 11:00:40 UTC)
Source: CVE Database V5
Vendor/Project: FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.
Product: V-SFT

Description

An out-of-bounds read vulnerability exists in VS6ComFile!CSaveData::delete_mem of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.

AI-Powered Analysis

AILast updated: 10/10/2025, 11:20:59 UTC

Technical Analysis

CVE-2025-61863 is an out-of-bounds read vulnerability identified in the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd., specifically affecting versions 6.2.7.0 and earlier. The vulnerability resides in the VS6ComFile!CSaveData::delete_mem function, where improper bounds checking allows an attacker to read memory outside the intended buffer when processing specially crafted V-SFT files. This can result in information disclosure by leaking sensitive memory contents, cause the affected application to crash (ABEND), or potentially enable arbitrary code execution if exploited carefully. The attack vector is local, requiring the victim to open a malicious file, with no privileges required but user interaction necessary. The vulnerability impacts confidentiality, integrity, and availability, as reflected in its CVSS 3.1 score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H). While no public exploits are known yet, the potential for severe impact in industrial control or manufacturing environments where V-SFT is used is significant. The vulnerability highlights the risks of processing untrusted files and the importance of secure memory management in industrial software.

Potential Impact

For European organizations, especially those in manufacturing, industrial automation, and critical infrastructure sectors that utilize FUJI ELECTRIC's V-SFT software, this vulnerability poses a significant risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial processes through application crashes, or even full system compromise via arbitrary code execution. This could result in operational downtime, safety hazards, intellectual property theft, and regulatory compliance violations under GDPR if personal or sensitive data is exposed. The local attack vector and requirement for user interaction somewhat limit remote exploitation but insider threats or targeted spear-phishing attacks could leverage this vulnerability. Given the critical role of industrial control systems in European economies, the impact could extend to supply chain disruptions and economic losses.

Mitigation Recommendations

Organizations should immediately identify all instances of V-SFT version 6.2.7.0 and earlier in their environments and prioritize upgrading to a patched version once available from FUJI ELECTRIC or Hakko Electronics. Until patches are released, restrict access to V-SFT files and enforce strict file validation and scanning policies to prevent opening malicious files. Implement application whitelisting and sandboxing to limit the impact of potential exploitation. Train users to recognize and avoid opening suspicious or unsolicited V-SFT files. Monitor systems for abnormal application behavior or crashes indicative of exploitation attempts. Additionally, employ network segmentation to isolate industrial control systems and limit lateral movement. Engage with vendors for timely updates and consider deploying endpoint detection and response (EDR) tools capable of detecting anomalous memory access patterns related to out-of-bounds reads.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
jpcert
Date Reserved
2025-10-02T01:59:58.732Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68e8ea6230774abc8f786ea9

Added to database: 10/10/2025, 11:13:38 AM

Last enriched: 10/10/2025, 11:20:59 AM

Last updated: 10/10/2025, 12:42:11 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats