Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65001: CWE-787 Out-of-bounds Write in Fujitsu fbiosdrv.sys

0
High
VulnerabilityCVE-2025-65001cvecve-2025-65001cwe-787
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Fujitsu
Product: fbiosdrv.sys

Description

Fujitsu fbiosdrv.sys before 2.5.0.0 allows an attacker to potentially affect system confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 11/19/2025, 18:49:48 UTC

Technical Analysis

CVE-2025-65001 is an out-of-bounds write vulnerability classified under CWE-787 found in the Fujitsu fbiosdrv.sys driver, affecting versions prior to 2.5.0.0. The vulnerability allows an attacker with local access and high privileges to write data outside the intended buffer boundaries, potentially leading to arbitrary code execution or system crashes. The CVSS 3.1 base score is 8.2, indicating a high severity level. The attack vector is local (AV:L), requiring low attack complexity (AC:L), but high privileges (PR:H) and no user interaction (UI:N). The scope is changed (S:C), meaning the vulnerability can affect components beyond the initially vulnerable driver, impacting confidentiality, integrity, and availability with high impact (C:H/I:H/A:H). This type of vulnerability is particularly dangerous because out-of-bounds writes can corrupt memory, enabling privilege escalation or denial of service. Although no known exploits are currently in the wild, the vulnerability's characteristics suggest that exploitation could lead to full system compromise. The lack of available patches at the time of publication increases the urgency for mitigation. The vulnerability affects Fujitsu hardware or software environments that utilize the fbiosdrv.sys driver, which is likely present in enterprise or specialized systems. The technical details confirm the vulnerability's publication and assignment by MITRE, but no additional exploit indicators or patch links are provided yet.

Potential Impact

For European organizations, the impact of CVE-2025-65001 could be significant, especially in sectors relying on Fujitsu hardware or software that includes the fbiosdrv.sys driver. The vulnerability allows attackers with local high privileges to execute arbitrary code, potentially leading to full system compromise, data breaches, or disruption of critical services. This can affect confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by causing system crashes or denial of service. Organizations in finance, healthcare, government, and critical infrastructure sectors are particularly at risk due to the potential for severe operational disruption and data loss. The requirement for local high privileges limits remote exploitation but does not eliminate risk, as insider threats or attackers who gain initial access could leverage this vulnerability to escalate privileges and move laterally within networks. The absence of known exploits currently provides a window for proactive mitigation, but the high severity score necessitates urgent attention to prevent future exploitation. The vulnerability could also impact supply chain security if Fujitsu-based systems are integrated into larger European IT environments.

Mitigation Recommendations

1. Restrict local administrative access strictly to trusted personnel and systems to reduce the risk of exploitation by insiders or attackers with initial footholds. 2. Implement robust endpoint detection and response (EDR) solutions to monitor for anomalous behavior indicative of exploitation attempts targeting fbiosdrv.sys or related components. 3. Apply strict application whitelisting and privilege management to limit the ability of malicious code to execute even if local access is obtained. 4. Monitor Fujitsu's security advisories closely and prepare to deploy patches or updated driver versions as soon as they become available. 5. Conduct thorough audits of systems running Fujitsu fbiosdrv.sys to identify and isolate vulnerable versions. 6. Employ network segmentation to contain potential lateral movement from compromised systems. 7. Educate system administrators and security teams about the vulnerability specifics and signs of exploitation. 8. Consider deploying host-based intrusion prevention systems (HIPS) with rules targeting out-of-bounds write attempts or driver-level anomalies. 9. Maintain up-to-date backups and incident response plans tailored to address potential exploitation scenarios involving this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-11-12T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914cdd8e9dc40953be87352

Added to database: 11/12/2025, 6:11:36 PM

Last enriched: 11/19/2025, 6:49:48 PM

Last updated: 12/27/2025, 11:23:08 PM

Views: 1359

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats