CVE-2025-64468: CWE-416 Use After Free in NI LabVIEW
There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions
AI Analysis
Technical Summary
CVE-2025-64468 is a use-after-free vulnerability classified under CWE-416 found in National Instruments (NI) LabVIEW software, specifically in the function sentry!sentry_span_set_data(). This vulnerability arises during the parsing of corrupted or maliciously crafted Virtual Instrument (VI) files. When a user opens such a crafted VI file, the software improperly manages memory, leading to a use-after-free condition. This memory corruption can be exploited by attackers to execute arbitrary code with the privileges of the user running LabVIEW or to disclose sensitive information from memory. The vulnerability affects NI LabVIEW versions 23.1.0, 24.1.0, 25.1.0, and earlier, including the 2025 Q3 release (25.3). The CVSS v3.1 base score of 7.8 reflects a high severity, with attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a significant risk, especially in environments where LabVIEW is used to develop or run critical industrial control or research applications. The vulnerability's exploitation depends on convincing a user to open a malicious VI file, which could be delivered via phishing, insider threat, or compromised file shares. Given LabVIEW's widespread use in engineering and industrial automation, this vulnerability could be leveraged to disrupt operations or steal intellectual property.
Potential Impact
For European organizations, the impact of CVE-2025-64468 can be substantial, particularly in sectors relying heavily on NI LabVIEW such as manufacturing, automotive, aerospace, and scientific research. Successful exploitation could lead to unauthorized disclosure of sensitive design data or intellectual property, disruption of industrial processes, or full system compromise if arbitrary code execution is achieved. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal or sensitive data is exposed, and reputational damage. The requirement for user interaction limits mass exploitation but targeted attacks against engineers or researchers are plausible. The high integrity and availability impact means that critical control systems or research experiments could be manipulated or halted, affecting supply chains and innovation pipelines. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise.
Mitigation Recommendations
Immediate mitigation should focus on minimizing the risk of opening malicious VI files. Organizations should implement strict controls on file sharing and email attachments involving VI files, including user training to recognize suspicious files. Employ application whitelisting and sandboxing to restrict LabVIEW’s ability to execute untrusted code. Network segmentation should isolate engineering workstations from general corporate networks to limit lateral movement. Monitor endpoint behavior for unusual activity related to LabVIEW processes. Since no patches are currently available, maintain close communication with NI for updates and apply security patches promptly once released. Conduct regular backups of critical VI files and system configurations to enable recovery. Consider deploying endpoint detection and response (EDR) solutions with heuristics for memory corruption detection. Finally, enforce the principle of least privilege on user accounts running LabVIEW to reduce potential damage from exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Belgium, Switzerland
CVE-2025-64468: CWE-416 Use After Free in NI LabVIEW
Description
There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions
AI-Powered Analysis
Technical Analysis
CVE-2025-64468 is a use-after-free vulnerability classified under CWE-416 found in National Instruments (NI) LabVIEW software, specifically in the function sentry!sentry_span_set_data(). This vulnerability arises during the parsing of corrupted or maliciously crafted Virtual Instrument (VI) files. When a user opens such a crafted VI file, the software improperly manages memory, leading to a use-after-free condition. This memory corruption can be exploited by attackers to execute arbitrary code with the privileges of the user running LabVIEW or to disclose sensitive information from memory. The vulnerability affects NI LabVIEW versions 23.1.0, 24.1.0, 25.1.0, and earlier, including the 2025 Q3 release (25.3). The CVSS v3.1 base score of 7.8 reflects a high severity, with attack vector classified as local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), but requiring user interaction (UI:R). The scope is unchanged (S:U), and the impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). Although no public exploits are known at this time, the vulnerability poses a significant risk, especially in environments where LabVIEW is used to develop or run critical industrial control or research applications. The vulnerability's exploitation depends on convincing a user to open a malicious VI file, which could be delivered via phishing, insider threat, or compromised file shares. Given LabVIEW's widespread use in engineering and industrial automation, this vulnerability could be leveraged to disrupt operations or steal intellectual property.
Potential Impact
For European organizations, the impact of CVE-2025-64468 can be substantial, particularly in sectors relying heavily on NI LabVIEW such as manufacturing, automotive, aerospace, and scientific research. Successful exploitation could lead to unauthorized disclosure of sensitive design data or intellectual property, disruption of industrial processes, or full system compromise if arbitrary code execution is achieved. This could result in operational downtime, financial losses, regulatory penalties under GDPR if personal or sensitive data is exposed, and reputational damage. The requirement for user interaction limits mass exploitation but targeted attacks against engineers or researchers are plausible. The high integrity and availability impact means that critical control systems or research experiments could be manipulated or halted, affecting supply chains and innovation pipelines. Additionally, the vulnerability could be leveraged as a foothold for lateral movement within corporate networks, increasing the risk of broader compromise.
Mitigation Recommendations
Immediate mitigation should focus on minimizing the risk of opening malicious VI files. Organizations should implement strict controls on file sharing and email attachments involving VI files, including user training to recognize suspicious files. Employ application whitelisting and sandboxing to restrict LabVIEW’s ability to execute untrusted code. Network segmentation should isolate engineering workstations from general corporate networks to limit lateral movement. Monitor endpoint behavior for unusual activity related to LabVIEW processes. Since no patches are currently available, maintain close communication with NI for updates and apply security patches promptly once released. Conduct regular backups of critical VI files and system configurations to enable recovery. Consider deploying endpoint detection and response (EDR) solutions with heuristics for memory corruption detection. Finally, enforce the principle of least privilege on user accounts running LabVIEW to reduce potential damage from exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- NI
- Date Reserved
- 2025-11-04T16:05:53.433Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694416204eb3efac368e65d1
Added to database: 12/18/2025, 2:56:32 PM
Last enriched: 12/25/2025, 3:15:56 PM
Last updated: 2/6/2026, 11:56:19 AM
Views: 62
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumCVE-2026-2015: Improper Authorization in Portabilis i-Educar
MediumCVE-2026-2014: SQL Injection in itsourcecode Student Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.