CVE-2024-12742

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution through deserialization of untrusted data in NI G Web Development Software. Attackers can exploit it by tricking users into opening malicious project files. It affects G Web Development Software 2022 Q3 and earlier versions.

💻 Affected Systems

Products:
  • NI G Web Development Software
Versions: 2022 Q3 and prior versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default when processing project files.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running the software, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware execution on the user's workstation when opening a malicious project file.

🟢

If Mitigated

Limited impact if users only open trusted project files from verified sources and have endpoint protection.

🌐 Internet-Facing: LOW - Exploitation requires user interaction with malicious files, not direct network access.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious project files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires social engineering to get user to open malicious file. No authentication bypass needed as exploitation occurs during file processing.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2023 Q3 or later

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/deserialization-of-untrusted-data-vulnerability-in-ni-g-web-deve.html

Restart Required: No

Instructions:

1. Download latest version from NI website. 2. Run installer. 3. Follow installation prompts. 4. Verify version is 2023 Q3 or newer.

🔧 Temporary Workarounds

Restrict project file execution

all

Configure application control policies to block execution of G Web Development Software from untrusted locations or restrict project file extensions.

🧯 If You Can't Patch

  • Implement strict user training about opening only trusted project files from verified sources
  • Deploy endpoint detection and response (EDR) to monitor for suspicious process execution from G Web Development Software

🔍 How to Verify

Check if Vulnerable:

Check software version in Help > About. If version is 2022 Q3 or earlier, system is vulnerable.

Check Version:

Check Help > About in G Web Development Software GUI

Verify Fix Applied:

Verify version is 2023 Q3 or newer in Help > About menu.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process execution from G Web Development Software
  • Multiple failed file parsing attempts

Network Indicators:

  • Outbound connections from G Web Development Software to unknown IPs

SIEM Query:

Process creation where parent process contains 'G Web Development' and child process is unusual (e.g., cmd.exe, powershell.exe)

🔗 References

📤 Share & Export