Fuji Electric Monitouch V-SFT Vulnerabilities: Update Now or Risk Cyber Chaos!

Fuji Electric’s Monitouch V-SFT software has vulnerabilities that could let attackers execute arbitrary code. The CVSS v4 score is 8.5, indicating high risk. Users should update to version 6.2.3.0 and follow CISA’s security recommendations to minimize exploitation risk.

Hot Take:

Oh look, another day, another vulnerability! This time Fuji Electric’s Monitouch V-SFT is up for a cybersecurity makeover. If you’re still running anything before version 6.2.3.0, you might as well be sending out invitations to hackers with “BYO Exploits” on them.

Key Points:

  • Fuji Electric’s Monitouch V-SFT is affected by out-of-bounds write and stack-based buffer overflow vulnerabilities.
  • These vulnerabilities could lead to arbitrary code execution.
  • CVE-2024-5271 and CVE-2024-34171 are the party crashers here, both scoring 8.5 on the CVSS v4 scale.
  • Critical infrastructure sectors like manufacturing and energy are at risk.
  • Kimiy from Trend Micro Zero Day Initiative is the whistleblower.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here