<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32926 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32926/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 01 Apr 2026 23:17:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32926/feed.xml" rel="self" type="application/rss+xml"/><item><title>V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32926)</title><link>https://feed.craftedsignal.io/briefs/2026-04-v-sft-oob-read/</link><pubDate>Wed, 01 Apr 2026 23:17:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-v-sft-oob-read/</guid><description>V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability in the VS6ComFile!load_link_inf function, allowing for potential information disclosure when opening a crafted V7 file.</description><content:encoded><![CDATA[<p>CVE-2026-32926 is an out-of-bounds read vulnerability affecting V-SFT versions 6.2.10.0 and earlier. The vulnerability exists within the <code>VS6ComFile!load_link_inf</code> function, which is responsible for processing V7 files. An attacker can exploit this vulnerability by crafting a malicious V7 file that, when opened by a vulnerable V-SFT application, triggers an out-of-bounds read. Successful exploitation could lead to information disclosure, potentially exposing sensitive data to the attacker. This vulnerability was reported and disclosed by JPCERT/CC.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a vulnerable V-SFT version (6.2.10.0 or prior).</li>
<li>Attacker crafts a malicious V7 file designed to trigger the out-of-bounds read in the <code>VS6ComFile!load_link_inf</code> function.</li>
<li>Attacker delivers the crafted V7 file to a target user, potentially through social engineering or other means.</li>
<li>The target user opens the malicious V7 file using the vulnerable V-SFT application.</li>
<li>The <code>VS6ComFile!load_link_inf</code> function attempts to read data beyond the allocated buffer while processing the crafted V7 file.</li>
<li>This out-of-bounds read allows the attacker to access memory regions outside the intended boundaries.</li>
<li>The attacker gains access to sensitive information stored in the adjacent memory regions due to the information disclosure.</li>
<li>The attacker extracts the disclosed information for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32926 can lead to information disclosure, potentially exposing sensitive data to an attacker. While the specific impact depends on the nature of the disclosed information, it could include intellectual property, configuration details, or other confidential data. The vulnerability affects systems running vulnerable versions of V-SFT.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade V-SFT to a version greater than 6.2.10.0 to patch CVE-2026-32926.</li>
<li>Monitor for attempts to open unusual or suspicious V7 files using V-SFT applications.</li>
<li>Implement the Sigma rule <code>Detect VS-FT opening unusual files</code> to detect suspicious file access patterns.</li>
<li>Review the V-SFT vendor&rsquo;s advisory for additional mitigation guidance (<a href="https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb">https://felib.fujielectric.co.jp/en/M10010/M20060/document_detail/5d9dd71d-9494-41a4-aa5c-8e6b8b21066b?region=en-glb</a>).</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>cve-2026-32926</category><category>out-of-bounds read</category><category>information disclosure</category></item></channel></rss>