Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12097: CWE-23- Relative Path Traversal in NI LabVIEW

0
High
VulnerabilityCVE-2025-12097cvecve-2025-12097cwe-23
Published: Thu Dec 04 2025 (12/04/2025, 19:07:46 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is a relative path traversal vulnerability in the NI System Web Server that may result in information disclosure.  Successful exploitation requires an attacker to send a specially crafted request to the NI System Web Server, allowing the attacker to read arbitrary files.  This vulnerability existed in the NI System Web Server 2012 and prior versions.  It was fixed in 2013.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:25:37 UTC

Technical Analysis

CVE-2025-12097 identifies a relative path traversal vulnerability (CWE-23) in the NI System Web Server component bundled with NI LabVIEW version 9.0.0 and earlier. The vulnerability arises from insufficient validation of user-supplied input in HTTP requests, allowing attackers to manipulate file path parameters to access files outside the intended web server directory. By crafting specific requests, an attacker can traverse directories and read arbitrary files on the host system, potentially exposing sensitive configuration files, credentials, or proprietary data. The vulnerability affects versions released up to 2012 and was addressed in a patch released in 2013. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of remote exploitation without authentication or user interaction, and the high confidentiality impact. The vulnerability does not impact system integrity or availability. No public exploits have been reported, but the risk remains for unpatched legacy systems. This vulnerability is particularly relevant for organizations relying on NI LabVIEW for industrial automation, test, and measurement applications, where sensitive operational data may be exposed. The NI System Web Server is typically used for remote monitoring and control, increasing the attack surface if exposed to untrusted networks.

Potential Impact

The primary impact of CVE-2025-12097 is unauthorized disclosure of sensitive information due to arbitrary file read capabilities. Attackers can access configuration files, credentials, or proprietary data stored on the affected system, potentially facilitating further attacks such as privilege escalation or lateral movement. Organizations using vulnerable NI LabVIEW versions in critical infrastructure, manufacturing, or research environments risk exposure of intellectual property and operational data. Since the vulnerability does not affect integrity or availability, direct system disruption is unlikely. However, the confidentiality breach can lead to significant operational and reputational damage, regulatory non-compliance, and financial loss. The ease of exploitation without authentication or user interaction increases the threat level, especially if the NI System Web Server is accessible from untrusted networks or the internet. Legacy systems that have not been updated since 2013 remain vulnerable, posing ongoing risk.

Mitigation Recommendations

1. Upgrade NI LabVIEW to a version released after 2013 that includes the patch for this vulnerability to eliminate the risk. 2. If upgrading is not immediately feasible, restrict network access to the NI System Web Server by implementing strict firewall rules to limit exposure only to trusted internal networks. 3. Employ network segmentation to isolate vulnerable systems from critical infrastructure and sensitive data repositories. 4. Monitor network traffic for suspicious HTTP requests that attempt directory traversal patterns (e.g., '../') targeting the NI System Web Server. 5. Disable or remove the NI System Web Server component if it is not required for operational purposes. 6. Conduct regular audits of systems running legacy NI LabVIEW versions to identify and remediate unpatched instances. 7. Implement intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect path traversal attempts. 8. Educate system administrators about the risks of legacy software and the importance of timely patching and network controls.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-10-22T21:08:54.165Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6931dff2e9ea82452668a407

Added to database: 12/4/2025, 7:24:34 PM

Last enriched: 2/27/2026, 9:25:37 AM

Last updated: 3/22/2026, 3:06:58 PM

Views: 174

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses