Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

Fuji Electric — Vulnerabilities & Security Advisories 65

Browse all 65 CVE security advisories affecting Fuji Electric. AI-powered Chinese analysis, POCs, and references for each vulnerability.

Fuji Electric operates as a major manufacturer of industrial automation, power systems, and electronic devices, primarily serving infrastructure and manufacturing sectors. With 64 recorded Common Vulnerabilities and Exposures (CVEs), the company’s attack surface largely centers on its industrial control systems and embedded software components. Historically, prevalent vulnerability classes include remote code execution (RCE) and cross-site scripting (XSS), often stemming from legacy web interfaces used for device management. Additionally, privilege escalation flaws have been documented, allowing unauthorized users to gain administrative access to critical operational technology. Notable security characteristics involve the reliance on outdated protocols in older hardware generations, which complicates patching efforts. While no single catastrophic public breach has been widely attributed solely to these specific CVEs, the accumulation of unpatched flaws in industrial gateways poses significant risks to operational continuity. The profile suggests a need for rigorous segmentation and updated firmware to mitigate exploitation of these known weaknesses in their extensive industrial ecosystem.

Found 15 results / 65Clear Filters
CVE IDTitleCVSSSeverityPublished
CVE-2024-11933 Fuji Electric Monitouch V-SFT X1 File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-122 7.8 -2024-11-27
CVE-2024-11798 Fuji Electric Monitouch V-SFT X1 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — Monitouch V-SFTCWE-787 7.8 -2024-11-27
CVE-2024-11797 Fuji Electric Monitouch V-SFT V8 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — Monitouch V-SFTCWE-787 7.8 -2024-11-27
CVE-2024-11796 Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — Monitouch V-SFTCWE-787 7.8 -2024-11-27
CVE-2024-11795 Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-11794 Fuji Electric Monitouch V-SFT V10 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — Monitouch V-SFTCWE-787 7.8 -2024-11-27
CVE-2024-11793 Fuji Electric Monitouch V-SFT V9C File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability — Monitouch V-SFTCWE-787 7.8 -2024-11-27
CVE-2024-11792 Fuji Electric Monitouch V-SFT V8 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-11791 Fuji Electric Monitouch V-SFT V8C File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-11790 Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-11789 Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-11787 Fuji Electric Monitouch V-SFT V10 File Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability — Monitouch V-SFTCWE-121 7.8 -2024-11-27
CVE-2024-5597 Fuji Electric Monitouch V-SFT Type Confusion — Monitouch V-SFTCWE-843 7.8 High2024-06-10
CVE-2024-34171 Fuji Electric Monitouch V-SFT Stack-Based Buffer Overflow — Monitouch V-SFTCWE-121 7.8 High2024-05-30
CVE-2024-5271 Fuji Electric Monitouch V-SFT Access of Resource Using Incompatible Type ('Type Confusion') — Monitouch V-SFTCWE-843 7.8 High2024-05-30

This page lists every published CVE security advisory associated with Fuji Electric. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.