CVE-2025-61864

7.8 HIGH

📋 TL;DR

A use-after-free vulnerability in V-SFT v6.2.7.0 and earlier allows attackers to execute arbitrary code, crash systems, or disclose information by tricking users into opening malicious V-SFT files. This affects industrial control system software used in critical infrastructure environments. Users of Fuji Electric's V-SFT software are vulnerable.

💻 Affected Systems

Products:
  • Fuji Electric V-SFT
Versions: v6.2.7.0 and earlier
Operating Systems: Windows (typically Windows 7/10/11 in industrial environments)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the VS6ComFile!load_link_inf component when processing V-SFT project files. Requires user interaction to open malicious files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with arbitrary code execution leading to industrial process disruption, data theft, or ransomware deployment in critical infrastructure environments.

🟠

Likely Case

System crashes (ABEND) disrupting industrial operations, followed by potential information disclosure or limited code execution in targeted attacks.

🟢

If Mitigated

Limited impact with proper network segmentation and file validation, potentially only causing application crashes without system compromise.

🌐 Internet-Facing: LOW - V-SFT is typically used in air-gapped or isolated industrial networks, not directly internet-exposed.
🏢 Internal Only: HIGH - Within industrial networks, successful exploitation could disrupt critical operations and spread to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to deliver malicious V-SFT files. No public exploit code available as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: v6.2.8.0 or later

Vendor Advisory: https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php

Restart Required: Yes

Instructions:

1. Download V-SFT v6.2.8.0 or later from Fuji Electric's download site. 2. Backup existing V-SFT projects. 3. Run installer with administrative privileges. 4. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict V-SFT file execution

windows

Block execution of V-SFT files from untrusted sources using application control policies

Using AppLocker: New-AppLockerPolicy -RuleType Path -Action Deny -Path "*.vsf" -User Everyone

User training and file validation

all

Train users to only open V-SFT files from trusted sources and implement file hash verification

🧯 If You Can't Patch

  • Network segmentation: Isolate V-SFT systems from general corporate network and internet access
  • Implement strict file validation: Only allow V-SFT files from whitelisted sources using DLP or email filtering

🔍 How to Verify

Check if Vulnerable:

Check V-SFT version in Help > About. If version is 6.2.7.0 or earlier, system is vulnerable.

Check Version:

In V-SFT: Help > About, or check registry: HKEY_LOCAL_MACHINE\SOFTWARE\Fuji Electric\V-SFT\Version

Verify Fix Applied:

Verify version shows 6.2.8.0 or later in Help > About after patch installation.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with VS6ComFile.dll errors
  • Unexpected V-SFT process termination events
  • Multiple failed file load attempts in V-SFT logs

Network Indicators:

  • Unusual outbound connections from V-SFT systems
  • File transfers to/from V-SFT systems from untrusted sources

SIEM Query:

EventID=1000 OR EventID=1001 AND ProcessName="V-SFT.exe" AND (ExceptionCode=0xc0000005 OR FaultingModule="VS6ComFile.dll")

🔗 References

📤 Share & Export