CVE-2025-9365
Fuji · Fuji Electric FRENIC-Loader 4
**A high-severity deserialization vulnerability in Fuji Electric FRENIC-Loader 4 allows an attacker to achieve remote code execution by tricking a user into importing a malicious file.**.
Executive summary
A high-severity deserialization vulnerability in Fuji Electric FRENIC-Loader 4 allows an attacker to achieve remote code execution by tricking a user into importing a malicious file.
Vulnerability
The software is vulnerable to deserialization of untrusted data when a user imports a specially crafted file. An attacker can create a malicious file containing a serialized object payload that, when processed by the application, executes arbitrary code on the victim's machine.
Business impact
Rated High with a CVSS score of 7.8, this vulnerability presents a significant risk, particularly in industrial control system (ICS) environments where this software is used. Successful exploitation could allow an attacker to take full control of the engineer's workstation, steal project files and credentials, install malware, or pivot from the workstation into the OT network to disrupt physical processes.
Remediation
Immediate Action: Update Fuji Electric FRENIC-Loader 4 to the latest patched version. Instruct all users to be extremely cautious and only import files from trusted, verified sources.
Proactive Monitoring: Monitor endpoints for suspicious process execution originating from the FRENIC-Loader application. Use endpoint detection and response (EDR) to look for common post-exploitation activities like network reconnaissance or credential dumping.
Compensating Controls: Implement application whitelisting to prevent the execution of unauthorized code. Ensure that workstations used for ICS engineering are segmented from the general corporate network and have restricted internet access.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The risk of remote code execution on an engineering workstation within an operational technology environment is critical. This vulnerability must be patched immediately to prevent a potential compromise that could bridge the IT/OT divide and lead to physical consequences. User awareness training is also a key mitigation.