{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-32929/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":7.8,"id":"CVE-2026-32929"}],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["cve-2026-32929","out-of-bounds read","information disclosure","v-sft"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2026-32929 is an out-of-bounds read vulnerability affecting V-SFT versions 6.2.10.0 and prior. The vulnerability exists within the \u003ccode\u003eVS6ComFile!get_macro_mem_COM\u003c/code\u003e function. An attacker can exploit this vulnerability by crafting a malicious V7 file. When a user opens the crafted V7 file with a vulnerable version of V-SFT, the out-of-bounds read can be triggered, leading to potential information disclosure. This vulnerability was disclosed on April 1, 2026, and poses a risk to users who rely on V-SFT software for industrial automation and control systems. Organizations should assess their exposure to this vulnerability and take appropriate mitigation steps, including updating to a patched version of V-SFT.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAttacker identifies a target using V-SFT versions 6.2.10.0 or prior.\u003c/li\u003e\n\u003cli\u003eAttacker crafts a malicious V7 file specifically designed to trigger the out-of-bounds read in \u003ccode\u003eVS6ComFile!get_macro_mem_COM\u003c/code\u003e.\u003c/li\u003e\n\u003cli\u003eAttacker delivers the crafted V7 file to the target, possibly through social engineering or other means.\u003c/li\u003e\n\u003cli\u003eThe target user opens the malicious V7 file using the vulnerable V-SFT software.\u003c/li\u003e\n\u003cli\u003eV-SFT attempts to parse the crafted V7 file, triggering the \u003ccode\u003eVS6ComFile!get_macro_mem_COM\u003c/code\u003e function.\u003c/li\u003e\n\u003cli\u003eDue to the malformed structure of the crafted V7 file, the \u003ccode\u003eget_macro_mem_COM\u003c/code\u003e function attempts to read data beyond the allocated buffer.\u003c/li\u003e\n\u003cli\u003eThe out-of-bounds read occurs, potentially disclosing sensitive information from the V-SFT process memory.\u003c/li\u003e\n\u003cli\u003eThe attacker may be able to leverage the disclosed information to further compromise the system or network.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-32929 can lead to information disclosure. An attacker who successfully exploits this vulnerability may be able to read sensitive data from the memory of the V-SFT process. The disclosed information could potentially include configuration settings, credentials, or other sensitive data that could be used to further compromise the affected system. While the NVD does not yet contain scoring data, JPCERT/CC assigned a base score of 7.8 HIGH.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade V-SFT to a version that patches CVE-2026-32929 to remediate the vulnerability.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u0026ldquo;Detect V-SFT V7 File Opening\u0026rdquo; to detect attempts to open V7 files using the vulnerable software.\u003c/li\u003e\n\u003cli\u003eMonitor systems running V-SFT for unexpected behavior or crashes, which could indicate exploitation attempts.\u003c/li\u003e\n\u003cli\u003eEducate users about the risks of opening files from untrusted sources to prevent social engineering attacks.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-04-01T23:17:03Z","date_published":"2026-04-01T23:17:03Z","id":"/briefs/2026-04-vsft-oob-read/","summary":"V-SFT versions 6.2.10.0 and prior contain an out-of-bounds read vulnerability (CVE-2026-32929) in VS6ComFile!get_macro_mem_COM, where opening a crafted V7 file may lead to information disclosure.","title":"V-SFT Out-of-Bounds Read Vulnerability (CVE-2026-32929)","url":"https://feed.craftedsignal.io/briefs/2026-04-vsft-oob-read/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-32929","version":"https://jsonfeed.org/version/1.1"}