CVE-2025-7361: CWE-94 Improper Control of Generation of Code ('Code Injection') in NI LabVIEW
A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node. This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions. LabVIEW 64-bit versions do not support CIN nodes and are not affected.
AI Analysis
Technical Summary
CVE-2025-7361 is a high-severity code injection vulnerability (CWE-94) found in the 32-bit versions of NI LabVIEW up to and including version 2025 Q1. The vulnerability arises from an improper initialization check related to the use of the CIN node within LabVIEW VI (Virtual Instrument) files. Specifically, when a user opens a specially crafted VI containing a malicious CIN node, it may allow an attacker to execute arbitrary code on the victim's system. The vulnerability does not affect 64-bit versions of LabVIEW, as these do not support CIN nodes. Exploitation requires user interaction, namely opening a malicious VI file, but does not require any prior authentication or elevated privileges. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction is necessary. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects multiple versions, including 23.0.0, 24.0.0, and 25.0.0, indicating a broad exposure for users of the 32-bit LabVIEW platform.
Potential Impact
For European organizations, especially those in industrial automation, engineering, research, and manufacturing sectors that rely on NI LabVIEW for system design, testing, and control, this vulnerability poses a significant risk. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to compromise sensitive intellectual property, disrupt critical control systems, or pivot within internal networks. The high impact on confidentiality, integrity, and availability means that attackers could steal proprietary data, alter system behavior, or cause denial of service. Given that LabVIEW is widely used in sectors such as automotive, aerospace, and energy within Europe, the threat could affect operational technology environments and research institutions. The requirement for user interaction (opening a malicious VI) suggests that targeted spear-phishing or supply chain attacks distributing malicious VI files are plausible attack vectors. The lack of 64-bit CIN node support limits the scope to 32-bit LabVIEW users, but many legacy systems may still be vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately identify and inventory all 32-bit NI LabVIEW installations, focusing on versions 23.0.0 through 25.0.0. Until an official patch is released, organizations should implement strict controls on the handling and opening of VI files, including disabling or restricting the use of CIN nodes where possible. User training should emphasize caution when opening VI files from untrusted sources. Network segmentation should be enforced to isolate systems running vulnerable LabVIEW versions from critical infrastructure and sensitive data repositories. Application whitelisting and endpoint detection and response (EDR) solutions should be configured to monitor and block suspicious execution patterns related to LabVIEW processes. Additionally, organizations should engage with NI for updates on patches or workarounds and plan for timely deployment once available. Implementing file integrity monitoring on VI files and logging user activities related to LabVIEW can aid in early detection of exploitation attempts. Finally, consider migrating to 64-bit LabVIEW versions where feasible, as these are not affected by this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Sweden, Finland, Belgium, Poland, Spain
CVE-2025-7361: CWE-94 Improper Control of Generation of Code ('Code Injection') in NI LabVIEW
Description
A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node. This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions. LabVIEW 64-bit versions do not support CIN nodes and are not affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-7361 is a high-severity code injection vulnerability (CWE-94) found in the 32-bit versions of NI LabVIEW up to and including version 2025 Q1. The vulnerability arises from an improper initialization check related to the use of the CIN node within LabVIEW VI (Virtual Instrument) files. Specifically, when a user opens a specially crafted VI containing a malicious CIN node, it may allow an attacker to execute arbitrary code on the victim's system. The vulnerability does not affect 64-bit versions of LabVIEW, as these do not support CIN nodes. Exploitation requires user interaction, namely opening a malicious VI file, but does not require any prior authentication or elevated privileges. The CVSS v3.1 base score is 7.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no privileges required, but user interaction is necessary. No known exploits are currently reported in the wild, and no patches have been published yet. The vulnerability affects multiple versions, including 23.0.0, 24.0.0, and 25.0.0, indicating a broad exposure for users of the 32-bit LabVIEW platform.
Potential Impact
For European organizations, especially those in industrial automation, engineering, research, and manufacturing sectors that rely on NI LabVIEW for system design, testing, and control, this vulnerability poses a significant risk. Successful exploitation could lead to arbitrary code execution, potentially allowing attackers to compromise sensitive intellectual property, disrupt critical control systems, or pivot within internal networks. The high impact on confidentiality, integrity, and availability means that attackers could steal proprietary data, alter system behavior, or cause denial of service. Given that LabVIEW is widely used in sectors such as automotive, aerospace, and energy within Europe, the threat could affect operational technology environments and research institutions. The requirement for user interaction (opening a malicious VI) suggests that targeted spear-phishing or supply chain attacks distributing malicious VI files are plausible attack vectors. The lack of 64-bit CIN node support limits the scope to 32-bit LabVIEW users, but many legacy systems may still be vulnerable. The absence of known exploits in the wild provides a window for proactive mitigation before active exploitation occurs.
Mitigation Recommendations
European organizations should immediately identify and inventory all 32-bit NI LabVIEW installations, focusing on versions 23.0.0 through 25.0.0. Until an official patch is released, organizations should implement strict controls on the handling and opening of VI files, including disabling or restricting the use of CIN nodes where possible. User training should emphasize caution when opening VI files from untrusted sources. Network segmentation should be enforced to isolate systems running vulnerable LabVIEW versions from critical infrastructure and sensitive data repositories. Application whitelisting and endpoint detection and response (EDR) solutions should be configured to monitor and block suspicious execution patterns related to LabVIEW processes. Additionally, organizations should engage with NI for updates on patches or workarounds and plan for timely deployment once available. Implementing file integrity monitoring on VI files and logging user activities related to LabVIEW can aid in early detection of exploitation attempts. Finally, consider migrating to 64-bit LabVIEW versions where feasible, as these are not affected by this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- NI
- Date Reserved
- 2025-07-08T16:56:14.380Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68893dfdad5a09ad00914ece
Added to database: 7/29/2025, 9:32:45 PM
Last enriched: 7/29/2025, 9:47:44 PM
Last updated: 7/31/2025, 12:58:49 AM
Views: 10
Related Threats
CVE-2025-8367: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-8366: Cross Site Scripting in Portabilis i-Educar
MediumCVE-2025-7847: CWE-434 Unrestricted Upload of File with Dangerous Type in tigroumeow AI Engine
HighCVE-2025-5720: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ivole Customer Reviews for WooCommerce
MediumCVE-2025-8365: Cross Site Scripting in Portabilis i-Educar
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.