CVE-2025-58775

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in KEYENCE KV STUDIO and VT5-WX15/WX12 products allows remote code execution when processing specially crafted files. This affects industrial control system (ICS) programming and configuration software used in manufacturing and automation environments. Attackers could gain full control of affected systems.

💻 Affected Systems

Products:
  • KV STUDIO
  • VT5-WX15
  • VT5-WX12
Versions: All versions prior to the fixed versions specified in vendor advisory
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects engineering workstations running KV STUDIO software and VT5-WX15/WX12 programmable logic controllers when processing malicious project files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to production disruption, data theft, or physical damage in industrial environments through arbitrary code execution.

🟠

Likely Case

Attackers gain control of engineering workstations to pivot into operational technology networks, potentially disrupting manufacturing processes.

🟢

If Mitigated

Limited impact if systems are air-gapped, have strict file transfer controls, and use least privilege principles.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check KEYENCE advisory for specific fixed versions

Vendor Advisory: https://www.keyence.com/kv_vulnerability2509301/

Restart Required: Yes

Instructions:

1. Review KEYENCE advisory JVNVU97069449
2. Download and install updated software versions from KEYENCE support portal
3. Restart affected systems after installation
4. Validate fix by testing with known safe project files

🔧 Temporary Workarounds

Restrict File Processing

windows

Implement strict controls on which files can be opened in KV STUDIO software

User Awareness Training

all

Train engineers and operators to only open trusted project files from verified sources

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and implement strict air-gapping
  • Implement application whitelisting to prevent execution of unauthorized code

🔍 How to Verify

Check if Vulnerable:

Check installed version of KV STUDIO software against KEYENCE advisory. Systems running affected versions are vulnerable.

Check Version:

Check version through KV STUDIO Help > About menu or Windows Programs and Features

Verify Fix Applied:

Verify software version matches or exceeds the patched version specified in KEYENCE advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process crashes of KV STUDIO
  • Unusual file access patterns to project files
  • Creation of unexpected child processes from KV STUDIO

Network Indicators:

  • Unusual network connections originating from engineering workstations
  • File transfers to/from KV STUDIO systems from untrusted sources

SIEM Query:

Process creation where parent_process contains 'kvstudio' AND (process_name contains 'cmd' OR process_name contains 'powershell' OR process_name contains unusual_executable)

🔗 References

📤 Share & Export