CVE-2025-61864: Use after free in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
A use after free vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
AI Analysis
Technical Summary
CVE-2025-61864 is a use-after-free vulnerability identified in the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd., specifically affecting versions 6.2.7.0 and earlier. The vulnerability resides in the VS6ComFile!load_link_inf function, which improperly manages memory when processing V-SFT files. When a specially crafted file is opened, the software may attempt to access memory that has already been freed, leading to undefined behavior. This can result in information disclosure, abnormal termination of the application (ABEND), or arbitrary code execution, allowing an attacker to potentially run malicious code within the context of the vulnerable application. The CVSS v3.1 base score is 7.8, reflecting high severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for code execution and data compromise. V-SFT is commonly used in industrial automation and manufacturing environments, where FUJI ELECTRIC products are deployed. The vulnerability's exploitation could disrupt critical industrial processes or leak sensitive operational data. The lack of an official patch link indicates that remediation may still be pending, emphasizing the need for interim mitigations and monitoring.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial control systems, and potential takeover of affected systems through arbitrary code execution. Such impacts could result in production downtime, safety hazards, financial losses, and damage to organizational reputation. Given the local attack vector and requirement for user interaction, the threat is more relevant to internal users or attackers with some access to the environment, such as through phishing or insider threats. However, the high impact on confidentiality, integrity, and availability means that successful exploitation could have severe consequences for operational continuity and data security. European organizations relying on V-SFT for automation tasks should consider this vulnerability a priority for risk management and incident preparedness.
Mitigation Recommendations
1. Restrict the sources of V-SFT files to trusted and verified origins to reduce the risk of opening malicious files. 2. Implement strict application whitelisting and execution control policies to prevent unauthorized or unexpected execution of V-SFT or related processes. 3. Educate users about the risks of opening files from untrusted sources and enforce policies to verify file authenticity before opening. 4. Monitor application logs and system behavior for signs of abnormal crashes or suspicious activity related to V-SFT. 5. Employ network segmentation to isolate systems running V-SFT, limiting lateral movement in case of compromise. 6. Once available, promptly apply official patches or updates from FUJI ELECTRIC / Hakko Electronics to remediate the vulnerability. 7. Consider deploying endpoint detection and response (EDR) solutions capable of detecting exploitation attempts involving use-after-free conditions or abnormal memory access patterns. 8. Maintain regular backups and incident response plans tailored to industrial control system environments to minimize downtime and data loss.
Affected Countries
Germany, France, Italy, United Kingdom, Netherlands, Belgium, Poland
CVE-2025-61864: Use after free in FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. V-SFT
Description
A use after free vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
AI-Powered Analysis
Technical Analysis
CVE-2025-61864 is a use-after-free vulnerability identified in the V-SFT software developed by FUJI ELECTRIC CO., LTD. and Hakko Electronics Co., Ltd., specifically affecting versions 6.2.7.0 and earlier. The vulnerability resides in the VS6ComFile!load_link_inf function, which improperly manages memory when processing V-SFT files. When a specially crafted file is opened, the software may attempt to access memory that has already been freed, leading to undefined behavior. This can result in information disclosure, abnormal termination of the application (ABEND), or arbitrary code execution, allowing an attacker to potentially run malicious code within the context of the vulnerable application. The CVSS v3.1 base score is 7.8, reflecting high severity, with an attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact is high on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the potential for code execution and data compromise. V-SFT is commonly used in industrial automation and manufacturing environments, where FUJI ELECTRIC products are deployed. The vulnerability's exploitation could disrupt critical industrial processes or leak sensitive operational data. The lack of an official patch link indicates that remediation may still be pending, emphasizing the need for interim mitigations and monitoring.
Potential Impact
For European organizations, particularly those in manufacturing, industrial automation, and critical infrastructure sectors, this vulnerability poses a substantial risk. Exploitation could lead to unauthorized disclosure of sensitive operational data, disruption of industrial control systems, and potential takeover of affected systems through arbitrary code execution. Such impacts could result in production downtime, safety hazards, financial losses, and damage to organizational reputation. Given the local attack vector and requirement for user interaction, the threat is more relevant to internal users or attackers with some access to the environment, such as through phishing or insider threats. However, the high impact on confidentiality, integrity, and availability means that successful exploitation could have severe consequences for operational continuity and data security. European organizations relying on V-SFT for automation tasks should consider this vulnerability a priority for risk management and incident preparedness.
Mitigation Recommendations
1. Restrict the sources of V-SFT files to trusted and verified origins to reduce the risk of opening malicious files. 2. Implement strict application whitelisting and execution control policies to prevent unauthorized or unexpected execution of V-SFT or related processes. 3. Educate users about the risks of opening files from untrusted sources and enforce policies to verify file authenticity before opening. 4. Monitor application logs and system behavior for signs of abnormal crashes or suspicious activity related to V-SFT. 5. Employ network segmentation to isolate systems running V-SFT, limiting lateral movement in case of compromise. 6. Once available, promptly apply official patches or updates from FUJI ELECTRIC / Hakko Electronics to remediate the vulnerability. 7. Consider deploying endpoint detection and response (EDR) solutions capable of detecting exploitation attempts involving use-after-free conditions or abnormal memory access patterns. 8. Maintain regular backups and incident response plans tailored to industrial control system environments to minimize downtime and data loss.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- jpcert
- Date Reserved
- 2025-10-02T01:59:58.732Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68e8ea6230774abc8f786ead
Added to database: 10/10/2025, 11:13:38 AM
Last enriched: 10/10/2025, 11:21:13 AM
Last updated: 11/21/2025, 1:57:47 PM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11127: CWE-639 Authorization Bypass Through User-Controlled Key in Mstoreapp Mobile App
UnknownCVE-2025-66115: Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in MatrixAddons Easy Invoice
UnknownCVE-2025-66114: Missing Authorization in theme funda Show Variations as Single Products Woocommerce
UnknownCVE-2025-66113: Missing Authorization in ThemeAtelier Better Chat Support for Messenger
UnknownCVE-2025-66112: Missing Authorization in WebToffee Accessibility Toolkit by WebYes
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.