OTPulse

Fuji Electric V-Server

Monitor7.3ICS-CERT ICSA-17-192-02Jul 11, 2017
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

V-Server contains a buffer overflow vulnerability (CWE-119) in network input handling that allows unauthenticated remote attackers to execute arbitrary code. Affected versions are 3.3.22.0 and earlier. No vendor patch is available; V-Server is no longer receiving security updates from Fuji Electric.

What this means
What could happen
An attacker with network access to V-Server can execute arbitrary code and cause a buffer overflow, potentially crashing the server or taking control of critical energy management operations.
Who's at risk
Energy sector operators using Fuji Electric V-Server for SCADA monitoring, data logging, or supervisory functions in power generation, transmission, or distribution systems. Any facility relying on V-Server for real-time operational visibility or control is at risk.
How it could be exploited
An attacker sends a specially crafted network request to V-Server on its network port. The request triggers a buffer overflow vulnerability (CWE-119) in input handling. The attacker can then execute arbitrary code on the server with the same privileges as the V-Server process, affecting any SCADA or energy management systems that rely on it.
Prerequisites
  • Network access to V-Server network port
  • V-Server version 3.3.22.0 or earlier must be running
  • No authentication required to trigger the vulnerability
remotely exploitableno authentication requiredlow complexityno patch availableaffects critical energy operations
Exploitability
Moderate exploit probability (EPSS 1.5%)
Affected products (1)
ProductAffected VersionsFix Status
V-Server:≤ 3.3.22.0No fix (EOL)
Remediation & Mitigation
0/4
Do now
0/1
HARDENINGIsolate V-Server from untrusted networks using a firewall; restrict access to authorized engineering workstations and control centers only
Schedule — requires maintenance window
0/1

Patching may require device reboot — plan for process interruption

HARDENINGMonitor V-Server for unexpected process crashes, high CPU usage, or unauthorized access attempts
Mitigations - no patch available
0/2
V-Server: has reached End of Life. The vendor will not release a patch. Apply the following compensating controls:
HARDENINGDisable network services on V-Server that are not required for your operations
HARDENINGEvaluate replacing V-Server with a newer version or alternative product that receives vendor support and patches
↑↓ Navigate · Esc Close
API: /api/v1/advisories/ee2c1ba9-c59b-4d05-aabf-3462c29178e0