Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6034: CWE-125 Out-of-bounds Read in NI Circuit Design Suite

0
High
VulnerabilityCVE-2025-6034cvecve-2025-6034cwe-125
Published: Tue Sep 30 2025 (09/30/2025, 16:07:21 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: Circuit Design Suite

Description

There is a memory corruption vulnerability due to an out of bounds read in DefaultFontOptions() when using SymbolEditor in NI Circuit Design Suite.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.1 and prior versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 04:08:41 UTC

Technical Analysis

CVE-2025-6034 is a memory corruption vulnerability classified under CWE-125 (Out-of-bounds Read) found in the National Instruments (NI) Circuit Design Suite, specifically within the DefaultFontOptions() function used by the SymbolEditor component. The flaw occurs when the software reads memory outside the bounds of allocated buffers while processing font options, triggered by opening a maliciously crafted .sym file. This out-of-bounds read can lead to the disclosure of sensitive information or, more critically, arbitrary code execution, allowing an attacker to run malicious code with the privileges of the user. The vulnerability affects NI Circuit Design Suite version 14.3.1 and all prior versions, with no patches currently available. Exploitation requires no privileges but does require user interaction, as the victim must open the crafted file. The CVSS v3.1 score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No known exploits have been reported in the wild as of the publication date. The vulnerability poses a significant risk to users of NI Circuit Design Suite, particularly those in engineering and electronics design environments where .sym files are commonly used.

Potential Impact

The vulnerability can lead to severe consequences including unauthorized disclosure of sensitive design data, intellectual property theft, and potential full system compromise through arbitrary code execution. This could disrupt engineering workflows, cause loss of proprietary circuit designs, and enable attackers to establish persistent footholds within affected environments. The requirement for user interaction limits mass exploitation but targeted attacks against organizations using NI Circuit Design Suite are plausible. The compromise of design data could have downstream effects on product integrity and safety, especially in critical infrastructure sectors relying on electronic circuit designs. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict controls on the handling of .sym files, including disabling the automatic opening of such files and educating users about the risks of opening files from untrusted sources. Employ application whitelisting and sandboxing techniques to restrict the execution environment of NI Circuit Design Suite. Network segmentation can limit exposure of affected systems. Monitoring for anomalous behavior related to the SymbolEditor component may help detect exploitation attempts. Once patches become available from NI, prompt deployment is essential. Additionally, organizations should maintain up-to-date backups of critical design files and implement robust endpoint protection solutions capable of detecting exploitation attempts targeting memory corruption vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
NI
Date Reserved
2025-06-12T16:24:47.539Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dc027ac906f71936581348

Added to database: 9/30/2025, 4:16:58 PM

Last enriched: 2/27/2026, 4:08:41 AM

Last updated: 3/21/2026, 6:46:30 AM

Views: 152

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses