CVE-2024-10495

7.8 HIGH

📋 TL;DR

This vulnerability allows attackers to read memory beyond intended boundaries when LabVIEW loads specially crafted font tables, potentially leading to information disclosure or arbitrary code execution. It affects users who open malicious VI files in NI LabVIEW 2024 Q3 and earlier versions. Successful exploitation requires social engineering to trick users into opening attacker-controlled files.

💻 Affected Systems

Products:
  • NI LabVIEW
Versions: 2024 Q3 and all prior versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All LabVIEW installations with affected versions are vulnerable when opening VI files. The vulnerability is in fontmgr.cpp component.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the LabVIEW user, potentially leading to full system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Information disclosure from memory contents, potentially exposing sensitive data or system information that could aid further attacks.

🟢

If Mitigated

Limited impact due to user awareness training preventing malicious file execution, with LabVIEW running in sandboxed or restricted environments.

🌐 Internet-Facing: LOW - Requires user interaction with malicious files, not directly exploitable over network interfaces.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires creating a specially crafted VI file and convincing a user to open it. No public exploits are currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LabVIEW 2024 Q3 with security update or later versions

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview-.html

Restart Required: Yes

Instructions:

1. Download the latest LabVIEW update from NI website. 2. Run the installer with administrative privileges. 3. Restart the system after installation completes. 4. Verify the update was applied successfully.

🔧 Temporary Workarounds

Restrict VI file execution

all

Configure application control policies to prevent execution of untrusted VI files

User awareness training

all

Train users to only open VI files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement strict application whitelisting to prevent execution of LabVIEW from untrusted locations
  • Use network segmentation to isolate LabVIEW systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check LabVIEW version via Help > About LabVIEW. If version is 2024 Q3 or earlier, the system is vulnerable.

Check Version:

In LabVIEW: Help > About LabVIEW, or on Windows: reg query "HKLM\SOFTWARE\National Instruments\LabVIEW\xx.x" /v Version (replace xx.x with version number)

Verify Fix Applied:

Verify LabVIEW version is updated to 2024 Q3 with security patch or later. Check NI security advisory for specific patch versions.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected LabVIEW crashes when loading VI files
  • Multiple failed attempts to load corrupted VI files
  • Unusual process behavior from labview.exe

Network Indicators:

  • Downloads of VI files from untrusted sources
  • Unusual file transfers to LabVIEW systems

SIEM Query:

Process:labview.exe AND (EventID:1000 OR EventID:1001) AND Keywords:"Application Error"

🔗 References

📤 Share & Export