Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 24 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:* cpe:2.3:a:ni:labview:2022:q3_patch6:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:* cpe:2.3:a:ni:labview:2023:q3_patch7:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:-:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2024:q3_patch4:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q1_patch3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3_patch1:*:*:*:*:*:* cpe:2.3:a:ni:labview:2025:q3_patch2:*:*:*:*:*:* |
Thu, 18 Dec 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | There is a stack-based buffer overflow vulnerability in NI LabVIEW in LVResFile::FindRsrcListEntry() when parsing a corrupted VI file. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted VI. This vulnerability affects NI LabVIEW 2025 Q3 (25.3) and prior versions. | |
| Title | Stack-based Buffer Overflow in LVResource::DetachResource() in NI LabVIEW | |
| First Time appeared |
Ni
Ni labview |
|
| Weaknesses | CWE-121 | |
| CPEs | cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Ni
Ni labview |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: NI
Published:
Updated: 2026-02-26T16:07:27.577Z
Reserved: 2025-11-04T16:05:53.433Z
Link: CVE-2025-64469
Updated: 2025-12-18T15:22:42.570Z
Status : Analyzed
Published: 2025-12-18T15:15:59.193
Modified: 2025-12-24T15:09:34.350
Link: CVE-2025-64469
No data.
OpenCVE Enrichment
No data.