On November 4, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued five critical Industrial Control Systems (ICS) advisories, highlighting severe vulnerabilities in products from Fuji Electric, Survision, Delta Electronics, Radiometrics, and IDIS. These flaws affect systems used across critical manufacturing, energy, communications, and aviation sectors. The vulnerabilities range from stack-based buffer overflows to missing authentication for critical functions, with some rated at a CVSS score of 10.0 (Critical). Successful exploitation could allow attackers to execute arbitrary code, manipulate system functions, and disrupt essential services, posing a significant threat to operational technology (OT) environments and public safety.
The advisories cover a range of high-severity vulnerabilities across multiple vendors:
Fuji Electric Monitouch V-SFT-6: This HMI configuration software is affected by a heap-based buffer overflow (CVE-2025-54496) and a stack-based buffer overflow (CVE-2025-54526). Both vulnerabilities have a CVSS v3.1 score of 7.8 and can be exploited by tricking a user into opening a specially crafted project file, leading to remote code execution.
Delta Electronics CNCSoft-G2: This software contains a stack-based buffer overflow (CVE-2025-58317) that allows for code execution when a user opens a malicious file. It impacts manufacturing and energy sector operations.
Survision License Plate Recognition (LPR) Camera: A critical flaw involving missing authentication for a critical function allows an attacker to gain full system access without credentials.
Radiometrics VizAir: These aviation weather systems contain two critical vulnerabilities: Missing Authentication for a Critical Function (CVE-2025-61945) and Insufficiently Protected Credentials. With a CVSS score of 10.0, these flaws could allow an attacker to manipulate weather data and runway settings, creating extremely hazardous flight conditions.
IDIS ICM Viewer: This software is impacted by an argument injection vulnerability (CVE-2025-12556) with a CVSS score of 8.8, which could lead to arbitrary code execution on the host machine.
The advisories were released following responsible disclosure from security researchers, including Rocco Calvi (TecSecurity), Natnael Samson (Trend Micro's ZDI), and Vera Mens and Noam Moshe (Claroty Team82). There is no public evidence of active exploitation in the wild at this time, but the public disclosure of these high-severity flaws increases the likelihood of future attacks.
The impact of these vulnerabilities is severe due to their presence in critical infrastructure sectors. Exploitation of the Radiometrics flaws (CVSS 10.0) could directly endanger lives by providing false aviation data. In manufacturing and energy, exploiting the Fuji Electric and Delta Electronics vulnerabilities could lead to production shutdowns, equipment damage, and safety incidents through remote code execution. The Survision and IDIS flaws could enable attackers to bypass security controls, gain unauthorized access to sensitive networks, and pivot to other systems within the OT environment.
| Type | Value | Description |
|---|---|---|
| file_name | *.S6P |
Maliciously crafted Fuji Electric project file extension. |
| process_name | V-SFT-6.exe |
Fuji Electric HMI software process to monitor for anomalous behavior. |
| process_name | CNCSoft-G2.exe |
Delta Electronics software process to monitor for crashes or unusual child processes. |
| network_traffic_pattern | Unauthenticated API calls | Monitor for unauthenticated access attempts to critical functions on Survision LPR cameras. |
Security teams should focus on identifying vulnerable assets and monitoring for signs of exploitation.
V-SFT-6.exe or CNCSoft-G2.exe after a user opens a file.Immediate and strategic actions are required to mitigate these risks.
T1203 - Exploitation for Client Execution), train operators to be cautious of opening project files from untrusted sources.Apply vendor patches immediately to eliminate the vulnerabilities. This is the most effective mitigation.
Mapped D3FEND Techniques:
Isolate ICS/OT networks from IT networks and the internet to prevent external attackers from reaching vulnerable systems.
Train operators to recognize and avoid opening suspicious files from unknown sources to prevent client-side execution.
Organizations using the affected products must prioritize the deployment of security patches provided by the vendors. For Fuji Electric's Monitouch software, upgrading to version V6.2.9.0 or later is critical to remediate CVE-2025-54496 and CVE-2025-54526. A robust patch management program should be in place for all ICS/OT environments, including a regularly updated asset inventory, a process for testing patches in a non-production environment, and a deployment plan that minimizes operational disruption. For systems where patching is not immediately feasible, this technique should be supplemented with other compensating controls, but patching remains the definitive solution to eliminate the underlying risk.
Given the criticality of the systems involved, especially the Radiometrics VizAir aviation systems, network isolation is a crucial defense. Vulnerable ICS devices should not be accessible from the internet. Implement a defense-in-depth architecture using firewalls and demilitarized zones (DMZs) to create strict segmentation between the corporate IT network and the OT network. All traffic between these zones should be denied by default, with specific, audited rules allowing only essential communication. For the Survision and Radiometrics systems, which suffer from authentication bypasses, this isolation prevents unauthorized actors from ever reaching the vulnerable interfaces.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats