CVE-2025-7849

7.8 HIGH

📋 TL;DR

A memory corruption vulnerability in NI LabVIEW allows arbitrary code execution when users open specially crafted VI files. This affects LabVIEW 2025 Q1 and earlier versions. Attackers could gain full control of affected systems through crafted files.

💻 Affected Systems

Products:
  • NI LabVIEW
Versions: 2025 Q1 and prior versions
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: All LabVIEW installations within affected version range are vulnerable by default when opening VI files.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control, data theft, and lateral movement capabilities.

🟠

Likely Case

Local privilege escalation or remote code execution within the LabVIEW context, potentially leading to data exfiltration.

🟢

If Mitigated

Limited impact with proper file validation and user awareness preventing malicious file execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction to open malicious VI files. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: LabVIEW 2025 Q2 or later

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html

Restart Required: Yes

Instructions:

1. Download and install LabVIEW 2025 Q2 or later from NI website
2. Replace all vulnerable LabVIEW installations
3. Restart systems after installation

🔧 Temporary Workarounds

Restrict VI file execution

all

Block execution of untrusted VI files through application control policies

User awareness training

all

Train users to only open VI files from trusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to block LabVIEW execution
  • Restrict user permissions to prevent VI file execution

🔍 How to Verify

Check if Vulnerable:

Check LabVIEW version via Help > About LabVIEW menu

Check Version:

Not applicable - use GUI menu Help > About LabVIEW

Verify Fix Applied:

Verify version is 2025 Q2 or later in Help > About LabVIEW

📡 Detection & Monitoring

Log Indicators:

  • Unusual LabVIEW process behavior
  • Multiple failed VI file load attempts
  • Unexpected LabVIEW crashes

Network Indicators:

  • Unusual outbound connections from LabVIEW processes

SIEM Query:

process_name:labview.exe AND (event_id:1000 OR event_id:1001) OR file_extension:.vi AND suspicious_activity

🔗 References

📤 Share & Export