Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64461: CWE-787 Out-of-bounds Write in NI LabVIEW

0
High
VulnerabilityCVE-2025-64461cvecve-2025-64461cwe-787
Published: Thu Dec 18 2025 (12/18/2025, 14:21:18 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds write vulnerability in NI LabVIEW in mgocre_SH_25_3!RevBL() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

AILast updated: 12/18/2025, 14:41:28 UTC

Technical Analysis

CVE-2025-64461 is an out-of-bounds write vulnerability classified under CWE-787 found in National Instruments' LabVIEW software, specifically in the mgocre_SH_25_3!RevBL() function responsible for parsing VI (Virtual Instrument) files. The flaw arises when LabVIEW processes a specially crafted corrupted VI file, causing memory corruption due to writing outside the intended buffer boundaries. This memory corruption can lead to arbitrary code execution, allowing an attacker to execute malicious code with the privileges of the user running LabVIEW. Alternatively, it may cause information disclosure by corrupting memory contents. Exploitation requires user interaction, as the victim must open the malicious VI file. The vulnerability affects LabVIEW versions 23.1.0, 24.1.0, 25.1.0, and 25.3 (2025 Q3) and earlier. The CVSS 3.1 base score of 7.8 reflects high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits are known at this time, but the vulnerability poses a significant risk due to the potential for arbitrary code execution. LabVIEW is widely used in industrial automation, test and measurement, and engineering environments, making this vulnerability particularly critical for organizations relying on these systems.

Potential Impact

For European organizations, the impact of CVE-2025-64461 can be substantial, especially in sectors such as manufacturing, automotive, aerospace, and research institutions that heavily utilize NI LabVIEW for automation and control systems. Successful exploitation could lead to unauthorized code execution, enabling attackers to manipulate industrial processes, steal sensitive intellectual property, or disrupt operations. The confidentiality of proprietary designs and data could be compromised, while integrity and availability of control systems might be undermined, potentially causing operational downtime or safety hazards. Since exploitation requires user interaction, social engineering or phishing campaigns targeting engineers and technicians are plausible attack vectors. The lack of known exploits currently reduces immediate risk but does not eliminate the threat, especially as proof-of-concept code could emerge. The vulnerability's presence in multiple LabVIEW versions increases the attack surface across organizations that may not have updated to the latest releases. Given the critical role of LabVIEW in European industrial and research environments, the threat could have cascading effects on supply chains and critical infrastructure.

Mitigation Recommendations

To mitigate CVE-2025-64461, European organizations should implement a multi-layered approach: 1) Restrict the opening of VI files to trusted sources only, employing strict file validation and digital signature verification where possible. 2) Educate users, especially engineers and technical staff, about the risks of opening VI files from untrusted or unknown origins to reduce the likelihood of social engineering exploitation. 3) Apply any patches or updates released by National Instruments promptly once available, as the current information indicates no patch links but monitoring vendor advisories is critical. 4) Use application sandboxing or virtualization to isolate LabVIEW processes, limiting the impact of potential code execution. 5) Employ endpoint detection and response (EDR) tools to monitor for anomalous behavior indicative of exploitation attempts. 6) Implement network segmentation to limit access to critical control systems and reduce lateral movement opportunities. 7) Maintain regular backups of critical VI files and system configurations to enable recovery in case of compromise. These targeted measures go beyond generic advice and address the specific exploitation vector and environment of LabVIEW.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.432Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69440f154eb3efac368cd710

Added to database: 12/18/2025, 2:26:29 PM

Last enriched: 12/18/2025, 2:41:28 PM

Last updated: 12/18/2025, 9:53:27 PM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats