Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 24 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch6:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch7:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:-:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3_patch2:*:*:*:*:*:* |
Thu, 18 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a use-after-free vulnerability in sentry!sentry_span_set_data() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions | |
| Title | Use-after-Free in sentry!sentry_span_set_data() in NI LabVIEW | |
| First Time appeared |
Ni
Ni labview |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ni
Ni labview |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NI
Published:
Updated: 2026-02-26T16:07:27.885Z
Reserved: 2025-11-04T16:05:53.433Z
Link: CVE-2025-64468
Updated: 2025-12-18T15:02:33.376Z
Status : Analyzed
Published: 2025-12-18T15:15:59.043
Modified: 2025-12-24T15:11:39.433
Link: CVE-2025-64468
No data.
OpenCVE Enrichment
No data.