A deserialization of untrusted data vulnerability exists in NI VeriStand that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted project file. This vulnerability affects VeriStand 2024 Q2 and prior versions.
This vulnerability is identified as CVE-2024-6675.
NI strongly recommends upgrading the affected software to mitigate this vulnerability. Refer to the Affected Products section for information on upgrading these products.
CVE-2024-6675 – 7.8 - CVSS:3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
At NI, we view the security of our products as an important part of our commitment to our customers. Go to ni.com/security to stay informed and act upon security alerts and issues.
NI would like to thank kimiya working with Trend Micro Zero Day Initiative for reporting this issue and working with us on coordinated disclosure.
Product Version | Mitigation |
---|---|
VeriStand 2024 | Upgrade to NI VeriStand 2024 Q3 or later from NI Package Manager or Software Downloads |
VeriStand 2023 | Upgrade to NI VeriStand 2023 Q4 Patch 1 or later from NI Package Manager or Software Downloads |
VeriStand 2021 | Upgrade to NI VeriStand 2021 R3 Patch 2 or later from NI Package Manager or Software Downloads |
VeriStand 2020 and prior | Not in Mainstream Support |