Several vulnerabilities patched recently by Fuji Electric in its V-SFT product could be exploited by threat actors to gain access to the systems of industrial organizations.
Fuji Electric (Hakko Electronic) V-SFT is a configuration and development software for human-machine interfaces (HMIs). Organizations in the manufacturing and other industrial sectors use it to create and manage user interfaces for Fuji Electric’s Monitouch series HMIs, which are widely used around the world.
Cybersecurity researcher Michael Heinzl discovered that V-SFT is affected by several vulnerabilities, including ones that can lead to information disclosure or arbitrary code execution on the system running the software.
An attacker would need to use social engineering to trick a V-SFT user at the targeted organization into opening a malicious project file, which results in arbitrary code execution with the victim’s privileges. This can allow the hacker to take control of the system, Heinzl told SecurityWeek.
Heinzl has published his own advisories for each of the V-SFT vulnerabilities.
“The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated data structure,” the researcher explained.
The Japanese electrical equipment company has released patches (version 6.2.9.0), and Japan’s JPCERT recently published an advisory to inform organizations about the vulnerabilities.
However, JPCERT’s advisory contains little information on potential impact, and Fuji’s release notes do not appear to mention any security fixes.
The researcher told SecurityWeek that it took the vendor roughly four months to release patches after being notified. A previous batch of V-SFT vulnerabilities found by Heinzl took approximately nine months to address.
In total, more than 20 security holes discovered by Heinzl were patched by Fuji Electric in its HMI programmer in recent months.
| Learn More at SecurityWeek’s ICS Cybersecurity Conference The leading global conference series for Operations, Control Systems and OT/IT Security professionals to connect on SCADA, DCS PLC and field controller cybersecurity. ![]() October 27-30, 2025 | Atlanta www.icscybersecurityconference.com |
Related: ICS Patch Tuesday: Fixes Announced by Siemens, Schneider, Rockwell, ABB, Phoenix Contact
Related: Radiflow Unveils New OT Security Platform
Related: Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency


