CVE-2025-61692

VT STUDIO versions 8.53 and prior contain a use after free vulnerability. If the product uses a specially crafted file, arbitrary code may be executed on the affected product.
References
Link Resource
https://jvn.jp/en/vu/JVNVU97069449/ Third Party Advisory
https://www.keyence.com/vt_vulnerability250930 Mitigation Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:keyence:vt_studio:*:*:*:*:*:*:*:*

History

07 Oct 2025, 14:09

Type Values Removed Values Added
References () https://jvn.jp/en/vu/JVNVU97069449/ - () https://jvn.jp/en/vu/JVNVU97069449/ - Third Party Advisory
References () https://www.keyence.com/vt_vulnerability250930 - () https://www.keyence.com/vt_vulnerability250930 - Mitigation, Vendor Advisory
CPE cpe:2.3:a:keyence:vt_studio:*:*:*:*:*:*:*:*
First Time Keyence
Keyence vt Studio

02 Oct 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-02 06:15

Updated : 2025-10-07 14:09


NVD link : CVE-2025-61692

Mitre link : CVE-2025-61692

CVE.ORG link : CVE-2025-61692


JSON object : View

Products Affected

keyence

  • vt_studio
CWE
CWE-416

Use After Free