CVE-2025-2634

7.8 HIGH

📋 TL;DR

An out-of-bounds read vulnerability in NI LabVIEW's fontmgr component allows attackers to potentially disclose sensitive information or execute arbitrary code. This affects users who open maliciously crafted VI files in LabVIEW 2025 Q1 and earlier versions. Successful exploitation requires social engineering to trick users into opening specially crafted files.

💻 Affected Systems

Products:
  • NI LabVIEW
Versions: 2025 Q1 and prior versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All LabVIEW installations with affected versions are vulnerable by default when opening VI files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Arbitrary code execution with the privileges of the LabVIEW user, potentially leading to full system compromise, data theft, or lateral movement within the network.

🟠

Likely Case

Information disclosure through memory leaks, potentially exposing sensitive data or system information that could aid further attacks.

🟢

If Mitigated

Limited impact with proper user training and file validation controls in place, potentially resulting in application crashes but no code execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open a malicious VI file. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NI LabVIEW 2025 Q2 or later

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html

Restart Required: Yes

Instructions:

1. Download and install NI LabVIEW 2025 Q2 or later from NI's official website. 2. Restart the system after installation. 3. Verify the update was successful by checking the LabVIEW version.

🔧 Temporary Workarounds

Restrict VI file execution

all

Implement application whitelisting to prevent execution of untrusted VI files

User awareness training

all

Train users to only open VI files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Implement strict file validation policies to block untrusted VI files
  • Use network segmentation to isolate LabVIEW systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check LabVIEW version via Help > About LabVIEW. If version is 2025 Q1 or earlier, the system is vulnerable.

Check Version:

On Windows: Check via LabVIEW GUI Help > About. On command line: Not directly available.

Verify Fix Applied:

Verify LabVIEW version is 2025 Q2 or later via Help > About LabVIEW.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected LabVIEW crashes
  • Unusual file access patterns to VI files
  • Memory access violations in system logs

Network Indicators:

  • Unusual outbound connections from LabVIEW processes
  • File transfers of VI files from untrusted sources

SIEM Query:

Process:labview.exe AND (EventID:1000 OR EventID:1001) OR FileExtension:.vi AND SourceIP:External

🔗 References

📤 Share & Export