Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64465: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64465cvecve-2025-64465cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:35:24 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

AILast updated: 12/25/2025, 15:15:10 UTC

Technical Analysis

CVE-2025-64465 is an out-of-bounds read vulnerability classified under CWE-125, found in the NI LabVIEW software, specifically within the lvre!DataSizeTDR() function responsible for parsing VI (Virtual Instrument) files. When LabVIEW processes a corrupted or specially crafted VI file, this vulnerability can cause the software to read memory outside the intended buffer boundaries. Such out-of-bounds reads can lead to the disclosure of sensitive information from adjacent memory or, in some cases, enable arbitrary code execution if the attacker can manipulate the memory layout effectively. The vulnerability affects NI LabVIEW versions 23.1.0, 24.1.0, 25.1.0, and earlier, including the 2025 Q3 release (25.3). Exploitation requires an attacker to trick a user into opening a malicious VI file, meaning user interaction is necessary. The CVSS v3.1 score of 7.8 reflects high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction is mandatory. No public exploits have been reported yet, but the potential for arbitrary code execution makes this a critical concern for environments relying on LabVIEW for automation, control systems, or scientific instrumentation. The vulnerability's root cause is improper bounds checking during VI file parsing, a common vector for memory corruption issues in software handling complex file formats.

Potential Impact

For European organizations, the impact of CVE-2025-64465 can be significant, especially in sectors relying heavily on NI LabVIEW for industrial automation, manufacturing process control, scientific research, and engineering design. Successful exploitation could lead to unauthorized disclosure of sensitive intellectual property or operational data, potentially compromising trade secrets or research results. More critically, arbitrary code execution could allow attackers to gain control over affected systems, leading to disruption of critical infrastructure, sabotage of manufacturing processes, or insertion of persistent malware. Given LabVIEW's widespread use in European automotive, aerospace, energy, and academic institutions, the vulnerability poses a risk to both commercial competitiveness and operational continuity. The requirement for user interaction limits remote exploitation but does not eliminate risk, as phishing or social engineering could be used to deliver malicious VI files. The absence of known exploits currently provides a window for proactive mitigation before active attacks emerge.

Mitigation Recommendations

European organizations should implement a multi-layered mitigation strategy beyond generic patching advice: 1) Immediately update NI LabVIEW installations to the latest patched version once available from NI, or apply any interim mitigations recommended by the vendor. 2) Enforce strict controls on the receipt and opening of VI files, including disabling automatic opening of VI files from untrusted sources and using sandboxed environments for testing unknown files. 3) Educate users, especially engineers and researchers, about the risks of opening unsolicited or suspicious VI files and implement phishing awareness training tailored to this threat. 4) Employ endpoint detection and response (EDR) solutions to monitor for anomalous behaviors indicative of exploitation attempts, such as unexpected process executions or memory access patterns. 5) Restrict LabVIEW usage to trusted networks and limit file sharing channels to reduce exposure. 6) Conduct regular audits of LabVIEW versions deployed across the organization to ensure compliance with security policies. 7) Collaborate with NI support for early access to patches or workarounds and monitor NI security advisories for updates. These targeted measures will reduce the attack surface and improve detection and response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.433Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694412994eb3efac368d95e2

Added to database: 12/18/2025, 2:41:29 PM

Last enriched: 12/25/2025, 3:15:10 PM

Last updated: 2/6/2026, 2:54:24 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats