CVE-2025-61858

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in V-SFT v6.2.7.0 and earlier allows attackers to execute arbitrary code by tricking users into opening malicious V-SFT files. This affects users of Fuji Electric's V-SFT software for industrial control systems, potentially leading to system compromise.

💻 Affected Systems

Products:
  • Fuji Electric V-SFT
Versions: v6.2.7.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Industrial control system software typically used in operational technology environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with remote code execution, allowing attackers to install malware, exfiltrate sensitive industrial control data, or disrupt operations.

🟠

Likely Case

System crashes (ABEND) and potential information disclosure when users open malicious files, with possible code execution in targeted attacks.

🟢

If Mitigated

Limited to denial of service if proper file validation and user awareness prevent malicious file execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires user interaction to open malicious file; no public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.2.8.0 or later

Vendor Advisory: https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php

Restart Required: Yes

Instructions:

1. Download latest version from Fuji Electric's website. 2. Uninstall current V-SFT. 3. Install updated version. 4. Restart system.

🔧 Temporary Workarounds

Restrict V-SFT file execution

windows

Block execution of V-SFT files from untrusted sources using application whitelisting.

Configure Windows AppLocker or similar to restrict V-SFT file execution

User awareness training

all

Train users to avoid opening V-SFT files from unknown or untrusted sources.

🧯 If You Can't Patch

  • Isolate V-SFT systems from internet and restrict network access
  • Implement strict file validation and scanning for all V-SFT files before opening

🔍 How to Verify

Check if Vulnerable:

Check V-SFT version in Help > About menu; versions 6.2.7.0 or earlier are vulnerable.

Check Version:

Not applicable - check via GUI Help > About menu

Verify Fix Applied:

Verify version is 6.2.8.0 or later in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of V-SFT.exe
  • Unexpected file access to V-SFT file extensions

Network Indicators:

  • Unusual outbound connections from V-SFT process

SIEM Query:

EventID=1000 Source=V-SFT.exe OR ProcessName=V-SFT.exe AND (ExceptionCode=0xC0000005 OR CommandLine CONTAINS ".vsf")

🔗 References

📤 Share & Export