Action not permitted
Modal body text goes here.
Modal Title
Modal Body
jvndb-2025-015451
Vulnerability from jvndb
Published
2025-10-09 13:39
Modified
2025-10-09 13:39
Severity ?
Summary
Multiple vulnerabilities in FUJI Electric V-SFT
Details
V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.
<ul>
<li>Stack-based buffer overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom (CWE-121) - CVE-2025-61856</li>
<li>Out-of-bounds write in VS6ComFile!CItemExChange::WinFontDynStrCheck (CWE-787) - CVE-2025-61857</li>
<li>Out-of-bounds write in VS6ComFile!set_AnimationItem (CWE-787) - CVE-2025-61858</li>
<li>Out-of-bounds write in VS6ComFile!CItemDraw::is_motion_tween (CWE-787) - CVE-2025-61859</li>
<li>Out-of-bounds read in VS6MemInIF!set_temp_type_default (CWE-125) - CVE-2025-61860</li>
<li>Out-of-bounds read in VS6ComFile!load_link_inf (CWE-125) - CVE-2025-61861</li><
<li>Out-of-bounds read in VS6ComFile!get_ovlp_element_size (CWE-125) - CVE-2025-61862</li>
<li>Out-of-bounds read in VS6ComFile!CSaveData::delete_mem (CWE-125) - CVE-2025-61863</li>
<li>Use after free in VS6ComFile!load_link_inf (use-after-free) (CWE-416) - CVE-2025-61864</li>
</ul>
Michael Heinzl reported these vulnerabilities to JPCERT/CC.
JPCERT/CC coordinated with the developer.
References
▼ | Type | URL |
---|---|---|
JVN | https://jvn.jp/en/vu/JVNVU90008453/index.html | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61856 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61857 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61858 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61859 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61860 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61861 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61862 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61863 | |
CVE | https://www.cve.org/CVERecord?id=CVE-2025-61864 | |
Stack-based Buffer Overflow(CWE-121) | https://cwe.mitre.org/data/definitions/121.html | |
Out-of-bounds Read(CWE-125) | https://cwe.mitre.org/data/definitions/125.html | |
Use After Free(CWE-416) | https://cwe.mitre.org/data/definitions/416.html | |
Out-of-bounds Write(CWE-787) | https://cwe.mitre.org/data/definitions/787.html |
Impacted products
▼ | Vendor | Product |
---|---|---|
Fuji Electric Co., Ltd. | V-SFT |
{ "@rdf:about": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-015451.html", "dc:date": "2025-10-09T13:39+09:00", "dcterms:issued": "2025-10-09T13:39+09:00", "dcterms:modified": "2025-10-09T13:39+09:00", "description": "V-SFT provided by FUJI ELECTRIC CO., LTD. contains multiple vulnerabilities listed below.\r\n\u003cul\u003e\r\n\u003cli\u003eStack-based buffer overflow in VS6ComFile!CV7BaseMap::WriteV7DataToRom (CWE-121) - CVE-2025-61856\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds write in VS6ComFile!CItemExChange::WinFontDynStrCheck (CWE-787) - CVE-2025-61857\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds write in VS6ComFile!set_AnimationItem (CWE-787) - CVE-2025-61858\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds write in VS6ComFile!CItemDraw::is_motion_tween (CWE-787) - CVE-2025-61859\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds read in VS6MemInIF!set_temp_type_default (CWE-125) - CVE-2025-61860\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds read in VS6ComFile!load_link_inf (CWE-125) - CVE-2025-61861\u003c/li\u003e\u003c\r\n\r\n\u003cli\u003eOut-of-bounds read in VS6ComFile!get_ovlp_element_size (CWE-125) - CVE-2025-61862\u003c/li\u003e\r\n\r\n\u003cli\u003eOut-of-bounds read in VS6ComFile!CSaveData::delete_mem (CWE-125) - CVE-2025-61863\u003c/li\u003e\r\n\r\n\u003cli\u003eUse after free in VS6ComFile!load_link_inf (use-after-free) (CWE-416) - CVE-2025-61864\u003c/li\u003e\r\n\u003c/ul\u003e\r\n\r\nMichael Heinzl reported these vulnerabilities to JPCERT/CC.\r\nJPCERT/CC coordinated with the developer.", "link": "https://jvndb.jvn.jp/en/contents/2025/JVNDB-2025-015451.html", "sec:cpe": { "#text": "cpe:/a:fujielectric:v-sft", "@product": "V-SFT", "@vendor": "Fuji Electric Co., Ltd.", "@version": "2.2" }, "sec:cvss": { "@score": "7.8", "@severity": "High", "@type": "Base", "@vector": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "@version": "3.0" }, "sec:identifier": "JVNDB-2025-015451", "sec:references": [ { "#text": "https://jvn.jp/en/vu/JVNVU90008453/index.html", "@id": "JVNVU#90008453", "@source": "JVN" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61856", "@id": "CVE-2025-61856", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61857", "@id": "CVE-2025-61857", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61858", "@id": "CVE-2025-61858", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61859", "@id": "CVE-2025-61859", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61860", "@id": "CVE-2025-61860", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61861", "@id": "CVE-2025-61861", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61862", "@id": "CVE-2025-61862", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61863", "@id": "CVE-2025-61863", "@source": "CVE" }, { "#text": "https://www.cve.org/CVERecord?id=CVE-2025-61864", "@id": "CVE-2025-61864", "@source": "CVE" }, { "#text": "https://cwe.mitre.org/data/definitions/121.html", "@id": "CWE-121", "@title": "Stack-based Buffer Overflow(CWE-121)" }, { "#text": "https://cwe.mitre.org/data/definitions/125.html", "@id": "CWE-125", "@title": "Out-of-bounds Read(CWE-125)" }, { "#text": "https://cwe.mitre.org/data/definitions/416.html", "@id": "CWE-416", "@title": "Use After Free(CWE-416)" }, { "#text": "https://cwe.mitre.org/data/definitions/787.html", "@id": "CWE-787", "@title": "Out-of-bounds Write(CWE-787)" } ], "title": "Multiple vulnerabilities in FUJI Electric V-SFT" }
CVE-2025-61859 (GCVE-0-2025-61859)
Vulnerability from cvelistv5
Published
2025-10-10 10:33
Modified
2025-10-10 15:46
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
An out-of-bounds write vulnerability exists in VS6ComFile!CItemDraw::is_motion_tween of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61859", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T15:46:20.993350Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T15:46:50.694Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write vulnerability exists in VS6ComFile!CItemDraw::is_motion_tween of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:33:18.226Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61859", "datePublished": "2025-10-10T10:33:18.226Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T15:46:50.694Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61856 (GCVE-0-2025-61856)
Vulnerability from cvelistv5
Published
2025-10-10 10:19
Modified
2025-10-10 16:31
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-121 - Stack-based buffer overflow
Summary
A stack-based buffer overflow vulnerability exists in VS6ComFile!CV7BaseMap::WriteV7DataToRom of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61856", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T16:31:46.618964Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T16:31:59.100Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A stack-based buffer overflow vulnerability exists in VS6ComFile!CV7BaseMap::WriteV7DataToRom of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-121", "description": "Stack-based buffer overflow", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:19:19.963Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61856", "datePublished": "2025-10-10T10:19:19.963Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T16:31:59.100Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61860 (GCVE-0-2025-61860)
Vulnerability from cvelistv5
Published
2025-10-10 10:36
Modified
2025-10-10 15:46
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An out-of-bounds read vulnerability exists in VS6MemInIF!set_temp_type_default of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61860", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T15:44:10.512412Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T15:46:02.385Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in VS6MemInIF!set_temp_type_default of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:36:33.157Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61860", "datePublished": "2025-10-10T10:36:33.157Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T15:46:02.385Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61861 (GCVE-0-2025-61861)
Vulnerability from cvelistv5
Published
2025-10-10 10:54
Modified
2025-10-10 13:13
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An out-of-bounds read vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61861", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T13:13:18.985973Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T13:13:29.277Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:54:50.609Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61861", "datePublished": "2025-10-10T10:54:50.609Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T13:13:29.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61863 (GCVE-0-2025-61863)
Vulnerability from cvelistv5
Published
2025-10-10 11:00
Modified
2025-10-10 12:57
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An out-of-bounds read vulnerability exists in VS6ComFile!CSaveData::delete_mem of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61863", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T12:56:04.330720Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T12:57:48.760Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in VS6ComFile!CSaveData::delete_mem of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T11:00:40.917Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61863", "datePublished": "2025-10-10T11:00:40.917Z", "dateReserved": "2025-10-02T01:59:58.732Z", "dateUpdated": "2025-10-10T12:57:48.760Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61864 (GCVE-0-2025-61864)
Vulnerability from cvelistv5
Published
2025-10-10 11:05
Modified
2025-10-10 12:52
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-416 - Use after free
Summary
A use after free vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61864", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T12:47:02.256921Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T12:52:01.882Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "A use after free vulnerability exists in VS6ComFile!load_link_inf of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-416", "description": "Use after free", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T11:05:28.873Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61864", "datePublished": "2025-10-10T11:05:28.873Z", "dateReserved": "2025-10-02T01:59:58.732Z", "dateUpdated": "2025-10-10T12:52:01.882Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61858 (GCVE-0-2025-61858)
Vulnerability from cvelistv5
Published
2025-10-10 10:28
Modified
2025-10-10 15:53
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
An out-of-bounds write vulnerability exists in VS6ComFile!set_AnimationItem of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61858", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T15:52:25.812293Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T15:53:10.489Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write vulnerability exists in VS6ComFile!set_AnimationItem of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:28:40.376Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61858", "datePublished": "2025-10-10T10:28:40.376Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T15:53:10.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61857 (GCVE-0-2025-61857)
Vulnerability from cvelistv5
Published
2025-10-10 10:29
Modified
2025-10-10 15:49
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-787 - Out-of-bounds Write
Summary
An out-of-bounds write vulnerability exists in VS6ComFile!CItemExChange::WinFontDynStrCheck of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61857", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T15:47:05.391005Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T15:49:01.724Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds write vulnerability exists in VS6ComFile!CItemExChange::WinFontDynStrCheck of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "Out-of-bounds Write", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T10:29:14.990Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61857", "datePublished": "2025-10-10T10:29:14.990Z", "dateReserved": "2025-10-02T01:59:58.731Z", "dateUpdated": "2025-10-10T15:49:01.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2025-61862 (GCVE-0-2025-61862)
Vulnerability from cvelistv5
Published
2025-10-10 10:58
Modified
2025-10-10 13:01
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
8.4 (High) - CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
VLAI Severity ?
EPSS score ?
CWE
- CWE-125 - Out-of-bounds Read
Summary
An out-of-bounds read vulnerability exists in VS6ComFile!get_ovlp_element_size of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system's abnormal end (ABEND), and arbitrary code execution.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd. | V-SFT |
Version: v6.2.7.0 and earlier |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-61862", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-10-10T12:59:00.425228Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-10-10T13:01:32.901Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "V-SFT", "vendor": "FUJI ELECTRIC CO., LTD. / Hakko Electronics Co., Ltd.", "versions": [ { "status": "affected", "version": "v6.2.7.0 and earlier" } ] } ], "descriptions": [ { "lang": "en", "value": "An out-of-bounds read vulnerability exists in VS6ComFile!get_ovlp_element_size of V-SFT v6.2.7.0 and earlier. Opening specially crafted V-SFT files may lead to information disclosure, affected system\u0027s abnormal end (ABEND), and arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] }, { "cvssV4_0": { "baseScore": 8.4, "baseSeverity": "HIGH", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N", "version": "4.0" }, "format": "CVSS", "scenarios": [ { "lang": "en-US", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-125", "description": "Out-of-bounds Read", "lang": "en-US", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-10-10T11:01:33.432Z", "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "shortName": "jpcert" }, "references": [ { "url": "https://monitouch.fujielectric.com/site/download-e/09vsft6_inf/Search.php" }, { "url": "https://jvn.jp/en/vu/JVNVU90008453/" } ] } }, "cveMetadata": { "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce", "assignerShortName": "jpcert", "cveId": "CVE-2025-61862", "datePublished": "2025-10-10T10:58:05.786Z", "dateReserved": "2025-10-02T01:59:58.732Z", "dateUpdated": "2025-10-10T13:01:32.901Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…