CVE-2025-61858
📋 TL;DR
An out-of-bounds write vulnerability in V-SFT v6.2.7.0 and earlier allows attackers to execute arbitrary code by tricking users into opening malicious V-SFT files. This affects users of Fuji Electric's V-SFT software for industrial control systems, potentially leading to system compromise.
💻 Affected Systems
- Fuji Electric V-SFT
📦 What is this software?
Monitouch V Sft by Fujielectric
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with remote code execution, allowing attackers to install malware, exfiltrate sensitive industrial control data, or disrupt operations.
Likely Case
System crashes (ABEND) and potential information disclosure when users open malicious files, with possible code execution in targeted attacks.
If Mitigated
Limited to denial of service if proper file validation and user awareness prevent malicious file execution.
🎯 Exploit Status
Requires user interaction to open malicious file; no public exploit code available at this time.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: v6.2.8.0 or later
Vendor Advisory: https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php
Restart Required: Yes
Instructions:
1. Download latest version from Fuji Electric's website. 2. Uninstall current V-SFT. 3. Install updated version. 4. Restart system.
🔧 Temporary Workarounds
Restrict V-SFT file execution
windowsBlock execution of V-SFT files from untrusted sources using application whitelisting.
Configure Windows AppLocker or similar to restrict V-SFT file execution
User awareness training
allTrain users to avoid opening V-SFT files from unknown or untrusted sources.
🧯 If You Can't Patch
- Isolate V-SFT systems from internet and restrict network access
- Implement strict file validation and scanning for all V-SFT files before opening
🔍 How to Verify
Check if Vulnerable:
Check V-SFT version in Help > About menu; versions 6.2.7.0 or earlier are vulnerable.
Check Version:
Not applicable - check via GUI Help > About menu
Verify Fix Applied:
Verify version is 6.2.8.0 or later in Help > About menu.
📡 Detection & Monitoring
Log Indicators:
- Application crashes of V-SFT.exe
- Unexpected file access to V-SFT file extensions
Network Indicators:
- Unusual outbound connections from V-SFT process
SIEM Query:
EventID=1000 Source=V-SFT.exe OR ProcessName=V-SFT.exe AND (ExceptionCode=0xC0000005 OR CommandLine CONTAINS ".vsf")