CVE-2025-57776

7.8 HIGH

📋 TL;DR

This vulnerability allows arbitrary code execution when a user opens a malicious DSB file in Digilent DASYLab. Attackers can exploit this by tricking users into opening specially crafted files. All DASYLab users are affected regardless of version.

💻 Affected Systems

Products:
  • Digilent DASYLab
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the DSB file parser component. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running DASYLab, potentially leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation leading to malware installation, data exfiltration, or lateral movement within the network.

🟢

If Mitigated

Limited impact if user runs with minimal privileges, though data loss or system instability could still occur.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious DSB file. No authentication bypass needed once file is opened.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NI security advisory for latest patched version

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-digilent-dasylab.html

Restart Required: Yes

Instructions:

1. Visit the NI security advisory page
2. Download the latest DASYLab update
3. Install the update following vendor instructions
4. Restart the system

🔧 Temporary Workarounds

Restrict DSB file execution

windows

Block execution of DSB files or restrict to trusted sources only

Run with reduced privileges

windows

Run DASYLab with limited user account privileges to reduce impact

🧯 If You Can't Patch

  • Implement application whitelisting to block unauthorized DSB files
  • Use email/web filtering to block DSB attachments from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check DASYLab version against patched versions in NI advisory

Check Version:

Check DASYLab 'About' menu or installation directory properties

Verify Fix Applied:

Verify DASYLab version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DASYLab crashes
  • DSB file access from unusual locations
  • Process creation from DASYLab with unusual parameters

Network Indicators:

  • DSB file downloads from untrusted sources
  • Outbound connections from DASYLab to suspicious IPs

SIEM Query:

Process: DASYLab.exe AND (FileExtension: .dsb OR CrashEvent)

🔗 References

📤 Share & Export