CVE-2025-61857

An · An Multiple Products

A high-severity vulnerability has been identified in multiple products from the vendor "An".

Executive summary

A high-severity vulnerability has been identified in multiple products from the vendor "An". This flaw, an out-of-bounds write, could allow an unauthenticated attacker to execute arbitrary code on a targeted system by tricking a user into processing a specially crafted file, potentially leading to a full system compromise.

Vulnerability

This is an out-of-bounds write vulnerability located in the WinFontDynStrCheck function within the VS6ComFile library. An attacker can exploit this by creating a malicious file or data stream with a specially crafted font string that, when processed by the vulnerable function, causes the application to write data beyond the boundaries of its allocated memory buffer. This memory corruption can be leveraged to trigger a denial-of-service condition by crashing the application or, more critically, to execute arbitrary code with the same privileges as the user running the software.

Business impact

This vulnerability is rated as High severity with a CVSS score of 7.8. Successful exploitation could lead to arbitrary code execution, allowing an attacker to install malware, exfiltrate sensitive data, or gain a persistent foothold within the network. The direct business impact includes potential data breaches, operational disruption if the affected software is critical, and significant reputational damage. The risk to the organization is substantial, as a compromised endpoint could serve as a pivot point for broader network intrusion.

Remediation

Immediate Action: The primary remediation is to apply the security updates provided by the vendor to all affected systems immediately. After patching, it is crucial to monitor for any signs of exploitation attempts by reviewing application and system logs for unexpected crashes or anomalous behavior related to the affected software.

Proactive Monitoring: Implement enhanced monitoring on systems running the affected software. Look for unusual process creation, unexpected network connections originating from the application, and review crash dump files for evidence of memory corruption. Intrusion Detection/Prevention Systems (IDS/IPS) should be updated with signatures to detect and block exploit attempts targeting this specific vulnerability.

Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:

  • Use Application Control (e.g., AppLocker) to prevent the vulnerable application from launching unauthorized child processes.
  • Deploy an Endpoint Detection and Response (EDR) solution to detect and block post-exploitation behavior.
  • Restrict user interaction with untrusted files, particularly those that would be processed by the vulnerable component.
  • Ensure network segmentation is in place to limit an attacker's ability to move laterally from a compromised host.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Given the High severity (CVSS 7.8) and the potential for arbitrary code execution, this vulnerability poses a significant risk. Although it is not currently listed in the CISA KEV catalog, it is a prime candidate for future inclusion should widespread exploitation occur. We strongly recommend that organizations prioritize the deployment of vendor-supplied patches to all affected systems on an expedited schedule. If patching is delayed, the compensating controls outlined above should be implemented immediately to reduce the attack surface.