Fuji Electric Monitouch V-SFT-6 (Update A)
Plan Patch7.8ICS-CERT ICSA-25-308-01Nov 4, 2025
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Fuji Electric Monitouch V-SFT-6 versions 6.2.7.0 and earlier contain buffer overflow vulnerabilities (CWE-122, CWE-121, CWE-787) that could allow an attacker with local access to crash the application or execute arbitrary code. Successful exploitation requires delivery of a malicious file and user interaction to open it in the vulnerable software.
What this means
What could happen
An attacker with local access to the engineering workstation running Monitouch V-SFT-6 could trigger a buffer overflow to crash the software or execute arbitrary commands, potentially disrupting SCADA design, simulation, and control system configuration workflows in energy facilities.
Who's at risk
Energy sector operators relying on Fuji Electric Monitouch V-SFT-6 for SCADA design, configuration, and system simulation on engineering workstations. This affects staff who create or maintain control logic, communication networks, and process setpoints for generation, transmission, and distribution systems.
How it could be exploited
An attacker would need to deliver a malicious file or input to a user of the V-SFT-6 software (e.g., via email attachment or phishing). When the user opens or processes the file in the vulnerable V-SFT-6 application, the buffer overflow is triggered, allowing code execution on the engineering workstation with the privileges of the user running the software.
Prerequisites
- Local access to an engineering workstation with Fuji Electric Monitouch V-SFT-6 versions 6.2.7.0 or earlier installed
- User must open or interact with a malicious file or input while the vulnerable software is running
- User must have permissions to run the V-SFT-6 application on the workstation
buffer overflow vulnerabilitylocal execution requireduser interaction requiredaffects engineering workstation (not field device)energy sector impact
Exploitability
Low exploit probability (EPSS 0.0%)
Affected products (1)
ProductAffected VersionsFix Status
Fuji Electric Monitouch V-SFT-6: 6.2.7.06.2.7.06.2.9.0 or newer
Remediation & Mitigation
0/4
Do now
0/2HARDENINGRestrict execution of Monitouch V-SFT-6 to trusted users; store project files on protected network shares with access controls
WORKAROUNDDo not click links or open attachments in unsolicited email, especially on engineering workstations
Schedule — requires maintenance window
0/1Patching may require device reboot — plan for process interruption
HOTFIXUpdate Fuji Electric Monitouch V-SFT-6 to version 6.2.9.0 or newer
Long-term hardening
0/1HARDENINGImplement file integrity monitoring on SCADA engineering workstations to detect unauthorized changes to V-SFT-6 project files
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/d6c1cfe3-3246-45b4-8de8-f10327582fff