Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64467: CWE-125 Out-of-bounds Read in NI LabVIEW

0
High
VulnerabilityCVE-2025-64467cvecve-2025-64467cwe-125
Published: Thu Dec 18 2025 (12/18/2025, 14:40:18 UTC)
Source: CVE Database V5
Vendor/Project: NI
Product: LabVIEW

Description

CVE-2025-64467 is a high-severity out-of-bounds read vulnerability in NI LabVIEW's LVResFile::FindRsrcListEntry() function when parsing corrupted VI files. Exploitation requires a user to open a specially crafted VI file, potentially leading to information disclosure or arbitrary code execution. The vulnerability affects LabVIEW versions 25. 3 and earlier, including 23. 1. 0, 24. 1. 0, and 25. 1. 0.

AI-Powered Analysis

AILast updated: 12/18/2025, 15:11:42 UTC

Technical Analysis

CVE-2025-64467 is an out-of-bounds read vulnerability classified under CWE-125 found in the NI LabVIEW software, specifically within the LVResFile::FindRsrcListEntry() function. This function is responsible for parsing resource list entries in VI (Virtual Instrument) files, which are LabVIEW's proprietary file format for graphical programming projects. When a corrupted or specially crafted VI file is processed, the function may read memory outside the intended buffer boundaries, leading to undefined behavior. This can result in the disclosure of sensitive information from memory or enable an attacker to execute arbitrary code within the context of the LabVIEW process. Exploitation requires an attacker to convince a user to open a malicious VI file, making user interaction necessary. The vulnerability affects multiple versions of LabVIEW up to and including 25.3 (Q3 2025 release). The CVSS v3.1 base score is 7.8, reflecting a high severity due to the potential for full compromise (confidentiality, integrity, and availability impacts) combined with low attack complexity and no privileges required. Although no public exploits have been reported yet, the nature of the vulnerability and the widespread use of LabVIEW in industrial and research environments make it a significant concern. The absence of a patch link suggests that a fix may still be pending or in development, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, the impact of CVE-2025-64467 can be substantial, especially those relying on NI LabVIEW for industrial automation, engineering design, scientific research, and control systems. Successful exploitation could lead to unauthorized disclosure of sensitive project data or intellectual property, disruption of critical processes through arbitrary code execution, and potential lateral movement within networks if attackers gain a foothold. This could compromise operational technology environments and research data confidentiality. Given LabVIEW's integration in manufacturing and research sectors, exploitation could cause downtime, financial losses, and reputational damage. The requirement for user interaction limits mass exploitation but targeted spear-phishing or social engineering attacks could be effective. The vulnerability also poses risks to supply chain security where LabVIEW is used to develop embedded systems or control software. The high CVSS score underscores the criticality of addressing this issue promptly to avoid severe operational and security consequences.

Mitigation Recommendations

To mitigate CVE-2025-64467, European organizations should: 1) Immediately restrict the opening of VI files from untrusted or unknown sources to prevent accidental exploitation. 2) Implement strict file validation and sandboxing mechanisms for LabVIEW projects to contain potential malicious activity. 3) Educate users on the risks of opening unsolicited or suspicious VI files, emphasizing cautious handling of email attachments and downloads. 4) Monitor LabVIEW environments for unusual behavior or crashes that could indicate exploitation attempts. 5) Employ endpoint detection and response (EDR) tools to detect anomalous process activity related to LabVIEW. 6) Coordinate with NI for timely updates and patches, and apply them as soon as they become available. 7) Consider network segmentation to isolate LabVIEW development and execution environments from critical infrastructure. 8) Maintain regular backups of LabVIEW projects and related data to enable recovery in case of compromise. These measures go beyond generic advice by focusing on controlling file sources, user awareness, and environment containment specific to LabVIEW usage.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
NI
Date Reserved
2025-11-04T16:05:53.433Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694416204eb3efac368e65da

Added to database: 12/18/2025, 2:56:32 PM

Last enriched: 12/18/2025, 3:11:42 PM

Last updated: 12/18/2025, 5:24:10 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats