Sploit.io - Search

Product: V-Server Lite, version: >= unspecified, < 3.3.24.0

CVE-2020-25171

Severity: Unknown

Description: The affected Fuji Electric V-Server Lite versions prior to 3.3.24.0 are vulnerable to an out-of-bounds write, which may allow an attacker to remotely execute arbitrary code.

CVSS Score: N/A

Priority

D

CISA Data

EPSS Data

  • EPSS: 0.002650000
  • Percentile: 0.499590000
  • Date: 2026-01-02

ExploitDB

No data available.

HackerOne Data

  • Rank: 8515
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Fuji Electric V-Server Lite - Versions: unspecified

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, CVE-2020-25171, is an out-of-bounds write within Fuji Electric V-Server Lite versions prior to 3.3.24.0. This means an attacker can potentially write data beyond the allocated memory buffer, potentially overwriting adjacent memory locations. This can lead to a variety of impacts, ranging from a denial of service to remote code execution. The business impact of this vulnerability is moderate to high, particularly for organizations relying on V-Server Lite for critical industrial control systems (ICS) operations. The likelihood of exploitation is moderate, as the attack surface is likely network-facing, and the vulnerability allows for remote exploitation. Ease of exploitation is also moderate; while an out-of-bounds write requires some level of precision, it’s a well-understood exploit technique. A successful exploit can compromise confidentiality through data theft, integrity through modification of control system parameters, and availability through system crashes or complete takeover. The EPSS score of 0.002650000 indicates a relatively low, but non-negligible, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker with network access to a vulnerable Fuji Electric V-Server Lite instance could exploit this out-of-bounds write vulnerability to gain remote code execution. The attack vector would be a crafted network request designed to trigger the write beyond the allocated buffer. The attacker could send a specially formatted data packet to the V-Server Lite, which, when processed, causes the out-of-bounds write. This write could overwrite critical data structures or function pointers, allowing the attacker to redirect execution flow to their injected code. The potential outcome is full remote control of the V-Server Lite instance, potentially leading to control of the underlying ICS process or system. This control could be leveraged to disrupt operations, steal sensitive data, or even cause physical damage depending on the system's function. For example, in a manufacturing environment, the attacker could alter process parameters leading to defective products or even equipment failure.

    3. Mitigation Recommendations
    The primary mitigation for CVE-2020-25171 is to upgrade to V-Server Lite version 3.3.24.0 or later. This patch resolves the out-of-bounds write vulnerability. Organizations should prioritize patching based on the criticality of the systems running V-Server Lite. If immediate patching isn’t possible, consider implementing compensating controls such as network segmentation to limit the attack surface. Restrict network access to the V-Server Lite instance to only those systems that absolutely require it. Implement robust network monitoring and intrusion detection systems to identify and alert on suspicious activity. Regularly review logs for indications of potential exploitation attempts. Consult the CISA advisory for further details and updates: https://us-cert.cisa.gov/ics/advisories/icsa-20-329-02.

    4. Executive Summary
    Fuji Electric V-Server Lite versions prior to 3.3.24.0 are vulnerable to a flaw that could allow an attacker to remotely control the system. This vulnerability, CVE-2020-25171, is an out-of-bounds write, which means attackers can potentially execute their own code on affected systems. This could disrupt operations, steal data, or even cause physical damage, particularly in industrial control system environments. The risk is moderate, but the potential impact is significant. We strongly recommend upgrading to version 3.3.24.0 or later as soon as possible. If immediate patching isn’t feasible, limit network access to the affected systems and monitor for suspicious activity. Addressing this vulnerability is crucial to maintaining the reliability and security of our ICS infrastructure.