Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64467: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64467cvecve-2025-64467cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:40:18 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

There is an out of bounds read vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions.

AI-Powered Analysis

AILast updated: 12/25/2025, 15:15:42 UTC

Technical Analysis

CVE-2025-64467 is an out-of-bounds read vulnerability classified under CWE-125 found in the NI LabVIEW software, specifically within the LVResFile::FindRsrcListEntry() function. This function is responsible for parsing VI (Virtual Instrument) files, which are the core files used by LabVIEW to represent programs and data flows. When a specially crafted, corrupted VI file is opened, the function reads memory outside the intended bounds, which can lead to unintended behavior. This vulnerability can result in either information disclosure, where sensitive data may be leaked, or arbitrary code execution, allowing an attacker to run malicious code within the context of the LabVIEW process. Exploitation requires that an attacker convince a user to open a malicious VI file, implying user interaction is necessary. The vulnerability affects NI LabVIEW versions 25.3 and earlier, including 23.1.0, 24.1.0, and 25.1.0. The CVSS v3.1 score is 7.8, indicating a high severity with attack vector local (requiring local access), low attack complexity, no privileges required, user interaction required, and high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for severe damage exists given the ability to execute arbitrary code. LabVIEW is widely used in engineering, manufacturing, and research sectors for automation and control systems, making this vulnerability particularly concerning for environments where LabVIEW is integral to operational technology or intellectual property protection.

Potential Impact

For European organizations, the impact of CVE-2025-64467 can be significant, especially in sectors relying heavily on NI LabVIEW for automation, testing, and control systems such as automotive, aerospace, manufacturing, and research institutions. Exploitation could lead to unauthorized disclosure of sensitive design data or intellectual property, disruption of critical industrial processes through arbitrary code execution, and potential compromise of operational technology environments. This could result in financial losses, reputational damage, regulatory penalties under GDPR if personal or sensitive data is exposed, and operational downtime. Given the integration of LabVIEW in critical infrastructure and industrial control systems, successful exploitation could also pose safety risks. The requirement for user interaction somewhat limits remote exploitation but does not eliminate risk, especially in environments where users frequently exchange VI files or receive files from external collaborators or suppliers.

Mitigation Recommendations

1. Restrict the sources of VI files: Implement strict policies to only allow opening VI files from trusted and verified sources. 2. User training: Educate users about the risks of opening VI files from unknown or untrusted origins and encourage verification before opening. 3. Application whitelisting: Use application control solutions to restrict execution of unauthorized or suspicious VI files. 4. Network segmentation: Isolate systems running LabVIEW from untrusted networks to reduce exposure. 5. Monitor for suspicious activity: Deploy endpoint detection and response (EDR) tools to identify anomalous behavior indicative of exploitation attempts. 6. Patch management: Although no patch links are currently available, monitor NI’s advisories closely and apply updates promptly once released. 7. Use sandboxing or virtual environments to open untrusted VI files safely when necessary. 8. Implement least privilege principles for users running LabVIEW to limit potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.433Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694416204eb3efac368e65da

Added to database: 12/18/2025, 2:56:32 PM

Last enriched: 12/25/2025, 3:15:42 PM

Last updated: 2/5/2026, 6:23:09 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats