National Instruments LabView
MonitorCVSS 7.8ICS-CERT ICSA-25-352-03Dec 18, 2025
National Instruments
Attack path
Attack VectorLocal
Auth RequiredNone
ComplexityLow
User InteractionRequired
Summary
Multiple memory corruption vulnerabilities (CWE-787, CWE-125, CWE-416, CWE-121) exist in National Instruments LabVIEW versions 2021 through 2025 Q3. Successful exploitation allows an attacker to disclose information and execute arbitrary code on affected systems. National Instruments has released patches for 2022, 2023, 2024, and 2025. LabVIEW 2021 is no longer in Mainstream Support and will not receive security updates.
What this means
What could happen
An attacker with access to a LabVIEW development machine could run arbitrary commands or steal sensitive information from test systems, potentially affecting data used to control industrial processes or validate control logic.
Who's at risk
LabVIEW developers and test engineers at utilities, manufacturers, and research facilities should care. This affects machines used to create or test control logic, data acquisition systems, and automation scripts. Compromised development machines could produce backdoored control logic or steal process parameters.
How it could be exploited
An attacker must trick a LabVIEW user into opening a malicious file or project (likely via email or compromised download) on a machine running a vulnerable LabVIEW version. When the file is opened, the attacker gains code execution on that machine.
Prerequisites
- Local access to a LabVIEW-equipped machine
- Vulnerable LabVIEW version (2021–2025 Q3) installed
- User action required (opening a malicious file or project)
No authentication required to trigger exploitationLow complexity attackNo patch available for 2021 and earlier versionsUser interaction required
Exploitability
Unlikely to be exploited — EPSS score 0.0%
Affected products (5)
5 pending
ProductAffected VersionsFix Status
LabVIEW: <=2025_Q3≤ 2025 Q3No fix yet
LabVIEW: 20242024No fix yet
LabVIEW: 20232023No fix yet
LabVIEW: 20222022No fix yet
LabVIEW: 20212021No fix yet
Remediation & Mitigation
0/6
Do now
0/1WORKAROUNDRestrict file opening privileges on LabVIEW machines; warn users not to open untrusted .vi files or projects from email or public sources
Schedule — requires maintenance window
0/5Patching may require device reboot — plan for process interruption
HOTFIXUpgrade LabVIEW 2025 to version 2025 Q3 Patch 3 or later via NI Package Manager or Software Downloads
HOTFIXUpgrade LabVIEW 2024 to version 2024 Q3 Patch 5 or later via NI Package Manager or Software Downloads
HOTFIXUpgrade LabVIEW 2023 to version 2023 Q3 Patch 8 or later via NI Package Manager or Software Downloads
HOTFIXUpgrade LabVIEW 2022 to version 2022 Q3 Patch 7 or later via NI Package Manager or Software Downloads
HARDENINGDecommission or isolate LabVIEW 2021 instances; National Instruments no longer provides security updates
CVEs (9)
↑↓ Navigate · Esc Close
API:
/api/v1/advisories/73a2302a-3539-4f17-9e3a-06c1493fe108Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.