Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65001: CWE-787 Out-of-bounds Write in Fujitsu fbiosdrv.sys

0
High
VulnerabilityCVE-2025-65001cvecve-2025-65001cwe-787
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Fujitsu
Product: fbiosdrv.sys

Description

Fujitsu fbiosdrv.sys before 2.5.0.0 allows an attacker to potentially affect system confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 11/12/2025, 18:17:16 UTC

Technical Analysis

CVE-2025-65001 is an out-of-bounds write vulnerability classified under CWE-787 found in the Fujitsu fbiosdrv.sys driver, affecting versions prior to 2.5.0.0. This driver-level flaw allows an attacker with local access and high privileges to write data outside the intended buffer boundaries, which can lead to arbitrary code execution or system crashes. The vulnerability impacts system confidentiality, integrity, and availability by enabling an attacker to potentially escalate privileges, execute malicious code in kernel mode, or cause denial of service conditions. The CVSS 3.1 base score is 8.2, indicating a high severity level, with attack vector local (AV:L), low attack complexity (AC:L), requiring high privileges (PR:H), no user interaction (UI:N), and scope changed (S:C). The vulnerability is currently published with no known exploits in the wild and no patches publicly available yet. The affected component, fbiosdrv.sys, is a Fujitsu-specific driver likely used in certain Fujitsu hardware or systems, which means the exposure is limited to environments running this driver. The out-of-bounds write can corrupt memory structures, potentially allowing kernel-level code execution or system instability. Due to the requirement for high privileges and local access, exploitation is limited to insiders or attackers who have already compromised user accounts with elevated rights. However, the impact of a successful exploit is severe, including full system compromise and data breaches.

Potential Impact

For European organizations, the impact of CVE-2025-65001 can be significant, especially for those using Fujitsu hardware or systems that include the fbiosdrv.sys driver. Successful exploitation could lead to unauthorized access to sensitive data, disruption of critical services, and potential lateral movement within networks. Sectors such as finance, healthcare, government, and critical infrastructure that rely on Fujitsu systems may face operational disruptions and data confidentiality breaches. The requirement for high privileges limits remote exploitation but does not eliminate risk from insider threats or attackers who have gained initial footholds. The vulnerability could also be leveraged as part of multi-stage attacks to escalate privileges and deploy ransomware or espionage tools. Given the high CVSS score and scope change, the vulnerability could affect multiple components or processes within the affected systems, amplifying the damage. European organizations must consider the regulatory implications of data breaches resulting from this vulnerability, including GDPR compliance and potential fines.

Mitigation Recommendations

1. Monitor Fujitsu's official channels for the release of patches or updated driver versions addressing CVE-2025-65001 and apply them promptly. 2. Until patches are available, restrict access to systems running the vulnerable driver to trusted administrators only and enforce strict privilege management to minimize the number of users with high-level access. 3. Implement application whitelisting and kernel integrity monitoring to detect anomalous behavior or unauthorized code execution attempts related to the fbiosdrv.sys driver. 4. Conduct thorough audits of local accounts and remove or disable unnecessary privileged accounts to reduce the attack surface. 5. Employ endpoint detection and response (EDR) solutions capable of identifying suspicious local activities or memory corruption attempts. 6. Segment networks to limit lateral movement opportunities if a local compromise occurs. 7. Educate system administrators and security teams about the vulnerability specifics to enhance vigilance and incident response readiness. 8. Consider temporary disabling or unloading the vulnerable driver if operationally feasible and if it does not impact critical system functions. 9. Maintain up-to-date backups and test restoration procedures to mitigate potential ransomware or destructive attack consequences stemming from exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914cdd8e9dc40953be87352

Added to database: 11/12/2025, 6:11:36 PM

Last enriched: 11/12/2025, 6:17:16 PM

Last updated: 11/12/2025, 8:24:48 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats