Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64463: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64463cvecve-2025-64463cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:28:21 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in LVResource::DetachResource() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:51:03 UTC

Technical Analysis

CVE-2025-64463 is an out-of-bounds read vulnerability classified under CWE-125, found in the LVResource::DetachResource() function of National Instruments (NI) LabVIEW software. The flaw occurs during the parsing of corrupted VI (Virtual Instrument) files, which are proprietary files used by LabVIEW to represent graphical programs. When a specially crafted VI file is opened, the vulnerability triggers an out-of-bounds read, potentially allowing an attacker to access memory beyond the intended buffer. This can lead to information disclosure or, more critically, arbitrary code execution within the context of the user running LabVIEW. The vulnerability affects versions 0, 23.1.0, 24.1.0, and 25.1.0, including the 2025 Q3 release (25.3) and earlier. Exploitation requires user interaction, specifically opening a malicious VI file, and no privileges are required beforehand. The CVSS v3.1 score is 7.8, reflecting high impact due to the potential for confidentiality, integrity, and availability compromise. Although no public exploits are currently known, the nature of the vulnerability and the widespread use of LabVIEW in industrial, engineering, and scientific environments make it a significant threat. The lack of available patches at the time of reporting necessitates immediate mitigation efforts to reduce risk.

Potential Impact

The vulnerability poses a serious risk to organizations relying on NI LabVIEW for critical engineering, automation, and testing workflows. Successful exploitation can lead to unauthorized disclosure of sensitive information, including intellectual property embedded in VI files or memory. More severely, arbitrary code execution could allow attackers to execute malicious payloads, potentially leading to system compromise, data corruption, or disruption of industrial processes. Given LabVIEW's use in sectors such as manufacturing, aerospace, automotive, and research institutions, the impact could extend to operational downtime, loss of proprietary data, and safety hazards if control systems are affected. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where VI files are shared or downloaded from external sources. The absence of known exploits currently provides a window for proactive defense, but the high CVSS score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

Organizations should implement strict controls on the handling and opening of VI files, especially those received from untrusted or external sources. Employ application whitelisting and sandboxing techniques to isolate LabVIEW processes and limit the impact of potential exploitation. Network segmentation can reduce exposure of critical systems running LabVIEW. Until official patches are released, consider disabling or restricting the use of LabVIEW on endpoints that are exposed to untrusted file sources. Educate users about the risks of opening unsolicited VI files and enforce policies for verifying file integrity and provenance. Monitor systems for unusual behavior indicative of exploitation attempts, such as unexpected memory access patterns or process anomalies. Engage with NI support channels to obtain updates on patch availability and apply them promptly once released. Additionally, maintain up-to-date backups of critical VI files and system configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.432Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694412994eb3efac368d95dc

Added to database: 12/18/2025, 2:41:29 PM

Last enriched: 2/27/2026, 6:51:03 AM

Last updated: 3/24/2026, 12:40:34 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses