JVN#91300609
RevoWorks SCVX and RevoWorks Browser vulnerable to incorrect resource transfer between spheres
Overview
RevoWorks SCVX and RevoWorks Browser provided by J’s Communication Co., Ltd. contain an incorrect resource transfer between spheres vulnerability.
Products Affected
- RevoWorks SCVX4.0.234 and earlier 4 series versions
- RevoWorks SCVX5.0.7 and earlier 5 series versions
- RevoWorks Browser2.2.100 and earlier 2 series versions
- RevoWorks Browser3.0.1 and earlier 3 series versions
Description
RevoWorks SCVX and RevoWorks Browser provided by J’s Communication Co., Ltd. build a sandbox environment isolated from a server or a client's local environment. These products provide the function enabling execution of sanitizing files when downloading files from the sandbox environment to the local environment. However, a defect in this function was found which some files of .csv and .eml are not processed for sanitization when downloading (CWE-669).
Impact
Malicious files may be downloaded to the system where using the product.
Solution
RevoWorks SCVX
Apply the Patch
Apply the patch according to the information provided by the developer.
- RevoWorks SCVX4.0.x: Patch only
- RevoWorks SCVX5.0.x: Patch and SCVX Image version update (SCVX Image5.0.16_446) required
RevoWorks Browser
Update the Software
The developer has released RevoWorks Browser2.2.101 and RevoWorks Browser3.0.2 that address the vulnerability.
Vendor Status
Vendor | Link |
J’s Communication Co., Ltd. | [Important] Vulnerability when downloading sanitized files in RevoWorks products (Text in Japanese) |
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Attack Vector(AV) | Physical (P) | Local (L) | Adjacent (A) | Network (N) |
---|---|---|---|---|
Attack Complexity(AC) | High (H) | Low (L) | ||
Privileges Required(PR) | High (H) | Low (L) | None (N) | |
User Interaction(UI) | Required (R) | None (N) | ||
Scope(S) | Unchanged (U) | Changed (C) | ||
Confidentiality Impact(C) | None (N) | Low (L) | High (H) | |
Integrity Impact(I) | None (N) | Low (L) | High (H) | |
Availability Impact(A) | None (N) | Low (L) | High (H) |
Credit
J’s Communication Co., Ltd. reported this vulnerability to JPCERT/CC to notify users of its solution through JVN.
JPCERT/CC and J’s Communication Co., Ltd. coordinated under the Information Security Early Warning Partnership.
Other Information
JPCERT Alert |
|
JPCERT Reports |
|
CERT Advisory |
|
CPNI Advisory |
|
TRnotes |
|
CVE |
CVE-2025-26698 |
JVN iPedia |
JVNDB-2025-000015 |