Fuji Electric Monitouch V-SFT-6

View CSAF

1. EXECUTIVE SUMMARY

  • CVSS v4 8.4
  • ATTENTION: Low attack complexity
  • Vendor: Fuji Electric
  • Equipment: Monitouch V-SFT-6
  • Vulnerabilities: Heap-based Buffer Overflow, Stack-based Buffer Overflow

2. RISK EVALUATION

Successful exploitation of these vulnerabilities could crash the accessed device; a buffer overflow condition may allow remote code execution.

3. TECHNICAL DETAILS

3.1 AFFECTED PRODUCTS

The following versions of Fuji Electric Monitouch V-SFT-6 human-machine interface (HMI) configuration software are affected:

  • Fuji Electric Monitouch V-SFT-6: Version 6.2.7.0

3.2 VULNERABILITY OVERVIEW

3.2.1 Heap-based Buffer Overflow CWE-122

A maliciously crafted project file may cause a heap-based buffer overflow, which may allow the attacker to execute arbitrary code.

CVE-2025-54496 has been assigned to this vulnerability. A CVSS v3.1 base score of 7.8 has been calculated; the CVSS vector string is (CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

A CVSS v4 score has also been calculated for CVE-2025-54496. A base score of 8.4 has been calculated; the CVSS vector string is (CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N).

3.2.2 Stack-based Buffer Overflow CWE-121

Fuji Electric Monitouch V-SFT-6 is vulnerable to a stack-based buffer overflow while processing a specially crafted project file, which

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from All CISA Advisories

Read the original article: