CVE-2025-64469

7.8 HIGH

📋 TL;DR

A stack-based buffer overflow vulnerability in NI LabVIEW's LVResFile::FindRsrcListEntry() function allows attackers to execute arbitrary code or disclose information by tricking users into opening malicious VI files. This affects all NI LabVIEW 2025 Q3 (25.3) and earlier versions. Successful exploitation requires user interaction to open a specially crafted file.

💻 Affected Systems

Products:
  • NI LabVIEW
Versions: 2025 Q3 (25.3) and all prior versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All LabVIEW installations within affected version range are vulnerable when opening VI files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with arbitrary code execution leading to data theft, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or information disclosure from the LabVIEW process memory, potentially leading to further system compromise.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, potentially only crashing the LabVIEW application.

🌐 Internet-Facing: LOW - Exploitation requires user interaction to open malicious files, not directly exploitable over network.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or shared malicious files, but requires social engineering.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting a malicious VI file and convincing a user to open it. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NI LabVIEW 2025 Q4 (25.4) or later

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/multiple-memory-corruption-vulnerabilities-in-ni-labview.html

Restart Required: Yes

Instructions:

1. Download and install NI LabVIEW 2025 Q4 (25.4) or later from NI website. 2. Close all LabVIEW instances before installation. 3. Restart system after installation completes.

🔧 Temporary Workarounds

Restrict VI file handling

all

Configure system to open VI files only with trusted LabVIEW versions or in isolated environments

Application sandboxing

all

Run LabVIEW in sandboxed/isolated environment to limit potential damage

🧯 If You Can't Patch

  • Implement strict file handling policies: only open VI files from trusted sources
  • Run LabVIEW with minimal user privileges and in isolated virtual environments

🔍 How to Verify

Check if Vulnerable:

Check LabVIEW version via Help > About LabVIEW. If version is 25.3 or earlier, system is vulnerable.

Check Version:

On Windows: wmic product where name="LabVIEW" get version. On Linux/macOS: Check installed packages for LabVIEW version.

Verify Fix Applied:

Verify LabVIEW version is 25.4 or later in Help > About LabVIEW after patch installation.

📡 Detection & Monitoring

Log Indicators:

  • LabVIEW crash logs with memory access violations
  • Unexpected process creation from LabVIEW
  • Multiple failed file open attempts

Network Indicators:

  • Unusual outbound connections from LabVIEW process
  • File downloads preceding LabVIEW crashes

SIEM Query:

process_name:"LabVIEW.exe" AND (event_id:1000 OR event_id:1001) OR file_extension:".vi" AND suspicious_activity

🔗 References

📤 Share & Export