CVE-2025-57778

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Digilent DASYLab allows arbitrary code execution when a user opens a malicious DSB file. This affects all versions of DASYLab software. Attackers can exploit this by tricking users into opening specially crafted files.

💻 Affected Systems

Products:
  • Digilent DASYLab
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the DSB file parser component. Requires user interaction to open malicious file.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining the same privileges as the user running DASYLab, potentially leading to data theft, ransomware deployment, or lateral movement.

🟠

Likely Case

Local privilege escalation or malware installation on the affected system, with potential data exfiltration.

🟢

If Mitigated

Limited impact if file execution is blocked or user has minimal privileges, though application crash or denial of service may still occur.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires social engineering to deliver malicious DSB file. No public exploit code available at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NI security advisory for specific patched versions

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-digilent-dasylab.html

Restart Required: Yes

Instructions:

1. Visit the NI security advisory page
2. Download the latest DASYLab update
3. Install the update following vendor instructions
4. Restart the system

🔧 Temporary Workarounds

Block DSB file execution

windows

Prevent execution of DSB files through application control or file extension blocking

User awareness training

all

Train users not to open DSB files from untrusted sources

🧯 If You Can't Patch

  • Run DASYLab with minimal user privileges to limit impact of exploitation
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check DASYLab version against patched versions in NI advisory

Check Version:

Check Help > About in DASYLab application

Verify Fix Applied:

Verify DASYLab version matches or exceeds patched version from advisory

📡 Detection & Monitoring

Log Indicators:

  • Application crashes from DASYLab
  • Unusual process execution following DSB file opening

Network Indicators:

  • Outbound connections from DASYLab process to unknown destinations

SIEM Query:

Process Creation where Image contains 'dasylab' AND CommandLine contains '.dsb'

🔗 References

📤 Share & Export