Published:2025/02/19  Last Updated:2025/02/19

JVN#91300609
RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres

Overview

RevoWorks SCVX and RevoWorks Browser provided by J’s Communication Co., Ltd. contain an incorrect resource transfer between spheres vulnerability.

Products Affected

  • RevoWorks SCVX4.0.234 and earlier 4 series versions
  • RevoWorks SCVX5.0.7 and earlier 5 series versions
  • RevoWorks Browser2.2.100 and earlier 2 series versions
  • RevoWorks Browser3.0.1 and earlier 3 series versions

Description

RevoWorks SCVX and RevoWorks Browser provided by J’s Communication Co., Ltd. build a sandbox environment isolated from a server or a client's local environment. These products provide the function enabling execution of sanitizing files when downloading files from the sandbox environment to the local environment. However, a defect in this function was found which some files of .csv and .eml are not processed for sanitization when downloading (CWE-669).

Impact

Malicious files may be downloaded to the system where using the product.

Solution

RevoWorks SCVX
Apply the Patch
Apply the patch according to the information provided by the developer.

  • RevoWorks SCVX4.0.x: Patch only
  • RevoWorks SCVX5.0.x: Patch and SCVX Image version update (SCVX Image5.0.16_446) required

RevoWorks Browser
Update the Software
The developer has released RevoWorks Browser2.2.101 and RevoWorks Browser3.0.2 that address the vulnerability.

References

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

CVSS v3 CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
Base Score: 2.7
Attack Vector(AV) Physical (P) Local (L) Adjacent (A) Network (N)
Attack Complexity(AC) High (H) Low (L)
Privileges Required(PR) High (H) Low (L) None (N)
User Interaction(UI) Required (R) None (N)
Scope(S) Unchanged (U) Changed (C)
Confidentiality Impact(C) None (N) Low (L) High (H)
Integrity Impact(I) None (N) Low (L) High (H)
Availability Impact(A) None (N) Low (L) High (H)

Credit

J’s Communication Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and J’s Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-26698
JVN iPedia JVNDB-2025-000015