Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64466: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64466cvecve-2025-64466cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:38:02 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in lvre!ExecPostedProcRecPost() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:51:47 UTC

Technical Analysis

CVE-2025-64466 is an out-of-bounds read vulnerability classified under CWE-125 found in National Instruments' LabVIEW software, specifically within the lvre!ExecPostedProcRecPost() function. This vulnerability occurs when LabVIEW parses a corrupted VI (Virtual Instrument) file, leading to an out-of-bounds memory read. Such memory corruption can cause the application to disclose sensitive information or allow an attacker to execute arbitrary code. The attack vector requires an attacker to convince a user to open a maliciously crafted VI file, which triggers the vulnerability. Affected versions include NI LabVIEW 2025 Q3 (25.3) and all prior versions down to at least 23.1.0. The vulnerability has a CVSS 3.1 base score of 7.8, with the vector indicating local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). While no public exploits have been reported yet, the potential for arbitrary code execution makes this a critical concern for environments using LabVIEW. The vulnerability highlights the risks of processing untrusted VI files and the need for robust input validation and secure file handling within engineering software environments.

Potential Impact

The impact of CVE-2025-64466 is significant for organizations using NI LabVIEW, especially in industrial automation, scientific research, and engineering sectors. Successful exploitation can lead to full system compromise via arbitrary code execution, allowing attackers to execute malicious payloads with the privileges of the user running LabVIEW. This can result in theft of sensitive intellectual property, disruption of critical engineering processes, or sabotage of automated systems. Information disclosure risks may expose proprietary data or credentials. Since LabVIEW is widely used in manufacturing, aerospace, automotive, and research institutions, the vulnerability could affect operational technology environments and research data integrity. The requirement for user interaction (opening a crafted VI file) means social engineering or phishing could be used to deliver the exploit, increasing the attack surface. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as attackers often develop exploits after public disclosure.

Mitigation Recommendations

To mitigate CVE-2025-64466, organizations should: 1) Immediately update NI LabVIEW to the latest patched version once available from the vendor, as no patches are currently linked but should be prioritized upon release. 2) Implement strict controls on the sources of VI files, restricting users from opening VI files from untrusted or unknown origins. 3) Employ application whitelisting and sandboxing techniques to limit the execution context of LabVIEW and contain potential exploitation. 4) Educate users about the risks of opening unsolicited or suspicious VI files, incorporating this into security awareness training. 5) Monitor LabVIEW process behavior and system logs for anomalies indicative of exploitation attempts, such as unexpected memory access violations or crashes. 6) Use endpoint detection and response (EDR) tools to detect and block suspicious activities related to LabVIEW. 7) Consider network segmentation to isolate systems running LabVIEW from critical infrastructure to limit lateral movement if compromise occurs. 8) Review and harden file parsing and input validation policies within LabVIEW project workflows to minimize exposure to malformed files.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.433Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694416204eb3efac368e65dd

Added to database: 12/18/2025, 2:56:32 PM

Last enriched: 2/27/2026, 6:51:47 AM

Last updated: 3/24/2026, 7:04:39 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses