Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64463: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64463cvecve-2025-64463cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:28:21 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in LVResource::DetachResource() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

AILast updated: 12/25/2025, 15:14:42 UTC

Technical Analysis

CVE-2025-64463 is an out-of-bounds read vulnerability classified under CWE-125 found in the LVResource::DetachResource() function of NI LabVIEW, a widely used graphical programming environment for engineering and industrial automation. The vulnerability occurs when LabVIEW parses a corrupted or specially crafted VI (Virtual Instrument) file, leading to an out-of-bounds memory read. This memory corruption can result in the disclosure of sensitive information or enable arbitrary code execution, depending on the memory contents accessed and subsequent program behavior. Exploitation requires an attacker to convince a user to open a malicious VI file, which means user interaction is necessary. The vulnerability affects multiple versions of LabVIEW up to and including 25.3 (Q3 2025 release). The CVSS 3.1 base score of 7.8 indicates a high severity, with an attack vector of local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but user interaction required (UI:R). The scope remains unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are currently known, the potential for serious impact exists due to the possibility of arbitrary code execution. The vulnerability highlights the risk of processing untrusted VI files in LabVIEW environments, which are common in industrial and research settings.

Potential Impact

For European organizations, the impact of CVE-2025-64463 can be significant, especially in sectors relying heavily on NI LabVIEW such as manufacturing, industrial automation, automotive, aerospace, and research institutions. Successful exploitation could lead to unauthorized disclosure of sensitive design data, intellectual property theft, or disruption of critical engineering processes through arbitrary code execution. This could compromise the integrity and availability of control systems and research environments, potentially causing operational downtime and financial losses. The requirement for user interaction limits remote exploitation but does not eliminate risk, as targeted spear-phishing or social engineering campaigns could deliver malicious VI files. The high confidentiality impact is particularly concerning for organizations handling proprietary or regulated data under GDPR and other European data protection laws. Additionally, the vulnerability could be leveraged as an initial foothold in a broader attack chain against industrial control systems or research networks.

Mitigation Recommendations

European organizations should implement several specific mitigations beyond generic advice: 1) Restrict and monitor the sources of VI files, ensuring only trusted and verified files are opened in LabVIEW environments. 2) Implement strict file integrity checks and sandboxing where possible to isolate the execution of VI files. 3) Educate users on the risks of opening unsolicited or unexpected VI files, emphasizing social engineering awareness. 4) Apply vendor patches promptly once available; monitor NI’s advisories for updates addressing this vulnerability. 5) Use endpoint protection solutions capable of detecting anomalous behavior related to LabVIEW processes. 6) Employ network segmentation to limit the spread of potential compromise originating from LabVIEW workstations. 7) Maintain regular backups of critical VI files and project data to enable recovery in case of compromise. 8) Conduct vulnerability scanning and penetration testing focused on LabVIEW environments to identify and remediate exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.432Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694412994eb3efac368d95dc

Added to database: 12/18/2025, 2:41:29 PM

Last enriched: 12/25/2025, 3:14:42 PM

Last updated: 2/5/2026, 9:53:20 PM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats