Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64465: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64465cvecve-2025-64465cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:35:24 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in lvre!DataSizeTDR() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:51:35 UTC

Technical Analysis

CVE-2025-64465 is an out-of-bounds read vulnerability classified under CWE-125 found in the NI LabVIEW software, specifically within the lvre!DataSizeTDR() function responsible for parsing VI (Virtual Instrument) files. When LabVIEW processes a corrupted or specially crafted VI file, this vulnerability can cause the program to read memory outside the intended buffer boundaries. This memory corruption can lead to two primary attack outcomes: information disclosure, where sensitive data from memory may be leaked, and arbitrary code execution, where an attacker could execute malicious code within the context of the LabVIEW process. Exploitation requires an attacker to convince a user to open a malicious VI file, which implies user interaction is necessary. The vulnerability affects all versions up to and including NI LabVIEW 2025 Q3 (version 25.3) and prior releases such as 23.1.0, 24.1.0, and 25.1.0. The CVSS v3.1 base score is 7.8, indicating high severity with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported yet, but the vulnerability poses a significant risk due to the potential for arbitrary code execution. NI has not yet published patches at the time of this report, so mitigation relies on defensive measures and cautious handling of VI files.

Potential Impact

The vulnerability poses a significant threat to organizations using NI LabVIEW, particularly in industrial automation, scientific research, and engineering environments where LabVIEW is widely deployed. Successful exploitation could lead to unauthorized disclosure of sensitive data, including intellectual property or operational data embedded in memory. More critically, arbitrary code execution could allow attackers to take control of affected systems, potentially disrupting critical processes, manipulating data, or establishing persistence within networks. Given LabVIEW's role in controlling hardware and instrumentation, exploitation could have downstream effects on physical systems, increasing the risk of operational disruption or safety hazards. The requirement for user interaction limits mass exploitation but does not eliminate targeted attacks, especially spear-phishing campaigns delivering malicious VI files. The absence of known exploits in the wild currently reduces immediate risk but does not preclude future attacks. Organizations failing to address this vulnerability may face data breaches, operational downtime, and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement the following specific measures: 1) Restrict the sources of VI files to trusted and verified origins, avoiding opening VI files from untrusted or unknown sources. 2) Employ application whitelisting and endpoint protection solutions capable of detecting anomalous behavior or exploitation attempts related to LabVIEW processes. 3) Educate users on the risks of opening unsolicited or suspicious VI files, emphasizing cautious handling of files received via email or external media. 4) Monitor system and network logs for unusual activity related to LabVIEW or file parsing errors that could indicate exploitation attempts. 5) Isolate LabVIEW workstations in segmented network zones to limit lateral movement if compromise occurs. 6) Maintain regular backups of critical VI files and system configurations to enable recovery from potential compromise. 7) Stay alert for official patches or updates from NI and apply them promptly once available. 8) Consider deploying sandbox environments to open and analyze VI files safely before use in production. These targeted actions go beyond generic advice by focusing on the unique context of LabVIEW and VI file handling.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.433Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694412994eb3efac368d95e2

Added to database: 12/18/2025, 2:41:29 PM

Last enriched: 2/27/2026, 6:51:35 AM

Last updated: 3/25/2026, 5:40:33 AM

Views: 145

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses