CVE-2025-9189

7.8 HIGH

📋 TL;DR

An out-of-bounds write vulnerability in Digilent DASYLab allows arbitrary code execution when users open malicious DSB files. This affects all versions of DASYLab software. Attackers can achieve full system compromise by tricking users into opening specially crafted files.

💻 Affected Systems

Products:
  • Digilent DASYLab
Versions: All versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the DSB file parser component. All installations are vulnerable by default when processing DSB files.

📦 What is this software?

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, potentially leading to data theft, ransomware deployment, or lateral movement within the network.

🟠

Likely Case

Local privilege escalation leading to installation of malware, data exfiltration, or persistence mechanisms on the compromised system.

🟢

If Mitigated

Limited impact with proper application whitelisting and user training preventing malicious file execution.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction to open malicious DSB file. No authentication required beyond file execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check NI security advisory for specific patched versions

Vendor Advisory: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-digilent-dasylab.html

Restart Required: Yes

Instructions:

1. Visit the NI security advisory page
2. Download the latest DASYLab update
3. Install the update following vendor instructions
4. Restart the system

🔧 Temporary Workarounds

Block DSB file execution

windows

Prevent execution of DSB files via application control or file extension blocking

Using Group Policy: Computer Configuration > Policies > Windows Settings > Security Settings > Software Restriction Policies > Additional Rules > New Path Rule: *.dsb = Disallowed

User awareness training

all

Train users to avoid opening DSB files from untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to only allow trusted applications
  • Use email/web gateways to block DSB file attachments and downloads

🔍 How to Verify

Check if Vulnerable:

Check DASYLab version against patched versions in NI advisory. All versions are vulnerable unless patched.

Check Version:

Check Help > About in DASYLab application or review installed programs in Control Panel

Verify Fix Applied:

Verify DASYLab version matches or exceeds patched version listed in NI security advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected DASYLab crashes
  • Process creation from DASYLab with unusual command lines
  • DSB file access from untrusted locations

Network Indicators:

  • Outbound connections from DASYLab process to unknown IPs
  • DNS requests for suspicious domains from DASYLab

SIEM Query:

Process Creation where Image contains 'dasylab' AND CommandLine contains '.dsb'

🔗 References

📤 Share & Export