The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32927

CVE-2026-32927: V-SFT Information Disclosure Vulnerability

CVE-2026-32927 is an out-of-bounds read information disclosure flaw in V-SFT versions 6.2.10.0 and prior. Opening crafted V7 files may expose sensitive data. This post covers technical details, affected versions, and mitigation.

Published: April 2, 2026

CVE-2026-32927 Overview

CVE-2026-32927 is an out-of-bounds read vulnerability (CWE-125) affecting Fuji Electric V-SFT versions 6.2.10.0 and prior. The vulnerability exists in the VS6MemInIF!set_temp_type_default function and can be triggered when opening a specially crafted V7 file. Successful exploitation may lead to information disclosure from the affected product.

Critical Impact

Opening a maliciously crafted V7 file could allow attackers to read sensitive information from memory beyond intended boundaries, potentially exposing confidential data or system information.

Affected Products

  • V-SFT version 6.2.10.0
  • V-SFT versions prior to 6.2.10.0

Discovery Timeline

  • 2026-04-01 - CVE-2026-32927 published to NVD
  • 2026-04-01 - Last updated in NVD database

Technical Details for CVE-2026-32927

Vulnerability Analysis

This vulnerability is classified as an out-of-bounds read (CWE-125), a memory corruption flaw where the application reads data past the end of an allocated buffer. The vulnerable function VS6MemInIF!set_temp_type_default fails to properly validate boundaries when processing V7 file contents.

V-SFT is a software tool used for configuring and programming Fuji Electric industrial touchscreen HMI (Human-Machine Interface) devices. The V7 file format is used to store project configurations for these devices. When the application parses a malformed V7 file, it may read memory locations outside the intended buffer, potentially disclosing sensitive information stored in adjacent memory regions.

The attack requires user interaction—specifically, a victim must open a crafted V7 file. In industrial environments, such files are commonly shared between engineers and operators, making social engineering attacks a viable delivery mechanism.

Root Cause

The root cause is improper bounds checking in the VS6MemInIF!set_temp_type_default function when parsing V7 file structures. The function does not adequately verify that data offsets and lengths within the file remain within allocated buffer boundaries before performing read operations.

Attack Vector

The attack vector is local and requires user interaction. An attacker must craft a malicious V7 project file with specially constructed data that triggers the out-of-bounds read condition. The attacker then needs to convince a target user to open this file using a vulnerable version of V-SFT.

When the victim opens the malicious file, the vulnerable function processes the crafted data and performs memory read operations beyond the allocated buffer. This can expose sensitive information such as:

  • Contents of adjacent memory regions
  • Internal application data structures
  • Potentially sensitive configuration information

The vulnerability mechanism involves malformed data structures within the V7 file format that cause the parser to calculate incorrect memory offsets. For detailed technical information, refer to the JVN Vulnerability Report and Fuji Electric Security Advisory.

Detection Methods for CVE-2026-32927

Indicators of Compromise

  • Unexpected V7 files appearing in project directories or received via email
  • V-SFT application crashes or abnormal behavior when opening project files
  • Unusual memory access patterns or application exceptions in system logs
  • Suspicious file transfers containing V7 files from unknown sources

Detection Strategies

  • Monitor file system activity for unexpected V7 file creation or modification in V-SFT project directories
  • Implement endpoint detection rules to alert on V-SFT application crashes or memory access violations
  • Deploy behavioral analysis to detect anomalous file parsing activity by the V-SFT process
  • Use SentinelOne's Storyline technology to correlate suspicious file delivery with subsequent V-SFT process behavior

Monitoring Recommendations

  • Enable application crash logging and monitoring for V-SFT processes
  • Implement email attachment scanning for V7 files from untrusted sources
  • Monitor network shares and removable media for suspicious V7 file activity
  • Configure SentinelOne agents to detect and alert on memory corruption exploitation attempts

How to Mitigate CVE-2026-32927

Immediate Actions Required

  • Identify all systems with V-SFT version 6.2.10.0 or earlier installed
  • Restrict the opening of V7 files from untrusted or unknown sources
  • Implement file scanning for V7 files received via email or network transfers
  • Contact Fuji Electric for patch availability and upgrade guidance
  • Isolate affected systems from unnecessary network exposure where feasible

Patch Information

Consult the Fuji Electric Security Advisory for official patch information and updated software versions that address this vulnerability. Organizations should prioritize applying vendor-provided updates as soon as they become available.

Workarounds

  • Only open V7 files from trusted and verified sources
  • Implement strict file transfer controls and validation procedures for project files
  • Consider using isolated virtual machines or sandboxed environments for opening untrusted V7 files
  • Apply the principle of least privilege to systems running V-SFT software
  • Enable application whitelisting to prevent execution of unauthorized software on ICS workstations
bash
# Example: Restrict V7 file access using file system permissions
# Limit V7 file directory access to authorized users only
chmod 750 /path/to/vsft/projects
chown vsft_admin:vsft_users /path/to/vsft/projects

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechV Sft

  • SeverityHIGH

  • CVSS Score8.4

  • EPSS Probability0.01%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityHigh
  • AvailabilityHigh
  • CWE References
  • CWE-125
  • Technical References
  • Fujielectric Document Detail

  • JVN Vulnerability Report
  • Related CVEs
  • CVE-2026-32929: V-SFT Information Disclosure Vulnerability

  • CVE-2026-32926: V-SFT Information Disclosure Vulnerability

  • CVE-2026-32928: V-SFT Buffer Overflow Vulnerability

  • CVE-2026-32925: V-SFT Buffer Overflow Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English