CVE-2025-2631 (GCVE-0-2025-2631)
Vulnerability from cvelistv5 – Published: 2025-04-09 19:10 – Updated: 2025-04-09 19:32
VLAI?
Summary
Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.
Severity ?
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Impacted products
Credits
Michael Heinzl working with CISA
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-2631",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-09T19:32:31.686691Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-09T19:32:46.740Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"MacOS",
"Linux"
],
"product": "LabVIEW",
"vendor": "NI",
"versions": [
{
"lessThan": "22.3.4",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThan": "23.3.5",
"status": "affected",
"version": "23.1.0",
"versionType": "semver"
},
{
"lessThan": "24.3.2",
"status": "affected",
"version": "24.1.0",
"versionType": "semver"
},
{
"lessThan": "25.1.1",
"status": "affected",
"version": "25.1.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Michael Heinzl working with CISA"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e"
}
],
"value": "Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
}
],
"impacts": [
{
"capecId": "CAPEC-100",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-100 Overflow Buffers"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
},
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-09T19:10:22.077Z",
"orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
"shortName": "NI"
},
"references": [
{
"url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation()",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
"assignerShortName": "NI",
"cveId": "CVE-2025-2631",
"datePublished": "2025-04-09T19:10:22.077Z",
"dateReserved": "2025-03-21T21:12:45.558Z",
"dateUpdated": "2025-04-09T19:32:46.740Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-2631\",\"sourceIdentifier\":\"security@ni.com\",\"published\":\"2025-04-09T20:15:27.183\",\"lastModified\":\"2025-08-18T19:36:03.480\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de escritura fuera de los l\u00edmites debido a una comprobaci\u00f3n incorrecta de los l\u00edmites en NI LabVIEW en InitCPUInformation(), que puede provocar la divulgaci\u00f3n de informaci\u00f3n o la ejecuci\u00f3n de c\u00f3digo arbitrario. Para explotarla con \u00e9xito, el atacante debe obligar al usuario a abrir un VI especialmente manipulado. Esta vulnerabilidad afecta a NI LabVIEW 2025 Q1 y versiones anteriores.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"security@ni.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2021\",\"matchCriteriaId\":\"807AE6D5-8096-47A2-A47D-1A5EFC85652D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D12D6CF-802F-47BA-ADF9-9E52C071BD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"340F61E5-D1ED-4C29-A894-8BC5C5B90ACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"52CC3023-4913-40BA-B74C-786F32DC7551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC150E98-5889-4A65-84B8-E4871091D104\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"85B3D429-4F3D-44CC-9304-837FB6D7E2A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7DD2022-CFB7-4F38-B459-C1AFB55B5B68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"18AB0B07-72FE-4861-B69D-AD2E87C5382E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"91928C9C-F094-4EE4-9FBE-2B7956D68E6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"044C4B51-C641-41F2-ACA0-834C99D63285\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"26EEE5E3-AD37-4832-A66C-5F8F7A478F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5DC20B17-C582-42C4-9780-5DC61B4AED91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"329575A0-F12E-478B-9A83-F747D6A161AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"953E8FD0-4420-4592-B696-C377D4EE0CA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D99DCCD-511E-482E-8307-24382D1B621B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"600A4905-B888-454F-9DF6-1C09FB71DBE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD79D082-AFF5-42CB-9D6C-12CF9A59D205\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB0991CF-642F-46D2-9C47-9540347DC074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D776E6DE-2635-4172-B08D-B7FB2D1048F9\"}]}]}],\"references\":[{\"url\":\"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html\",\"source\":\"security@ni.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-2631\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-09T19:32:31.686691Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-09T19:32:41.763Z\"}}], \"cna\": {\"title\": \"Out of Bounds Write Vulnerability in NI LabVIEW in InitCPUInformation()\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"Michael Heinzl working with CISA\"}], \"impacts\": [{\"capecId\": \"CAPEC-100\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-100 Overflow Buffers\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.8, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}, {\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"NOT_DEFINED\", \"baseScore\": 8.5, \"Automatable\": \"NOT_DEFINED\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"valueDensity\": \"NOT_DEFINED\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N\", \"providerUrgency\": \"NOT_DEFINED\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"NOT_DEFINED\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NI\", \"product\": \"LabVIEW\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"22.3.4\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"23.1.0\", \"lessThan\": \"23.3.5\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"24.1.0\", \"lessThan\": \"24.3.2\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"25.1.0\", \"lessThan\": \"25.1.1\", \"versionType\": \"semver\"}], \"platforms\": [\"Windows\", \"MacOS\", \"Linux\"], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-write-vulnerabilities-in-ni-labview.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Out of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eOut of bounds write vulnerability due to improper bounds checking in NI LabVIEW in InitCPUInformation() that may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q1 and prior versions.\u003c/p\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4\", \"shortName\": \"NI\", \"dateUpdated\": \"2025-04-09T19:10:22.077Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-2631\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-09T19:32:46.740Z\", \"dateReserved\": \"2025-03-21T21:12:45.558Z\", \"assignerOrgId\": \"bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4\", \"datePublished\": \"2025-04-09T19:10:22.077Z\", \"assignerShortName\": \"NI\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…