From Saturday, Nov 23rd 7:00 PM CST - Sunday, Nov 24th 7:45 AM CST, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
From Saturday, Nov 23rd 7:00 PM CST - Sunday, Nov 24th 7:45 AM CST, ni.com will undergo system upgrades that may result in temporary service interruption.
We appreciate your patience as we improve our online experience.
Improper error handling vulnerabilities in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. These vulnerabilities affect LabVIEW 2024 Q1 and prior versions.
These vulnerabilities are identified as CVE-2024-23609 and CVE-2024-23612.
NI strongly recommends patching the affected software to mitigate this vulnerability. Refer to the Affected Products section to download the update.
CVE-2024-23609– 7.8 - CVSS:3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2024-23612– 7.8 - CVSS:3.1 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
At NI, we view the security of our products as an important part of our commitment to our customers. Go to ni.com/security to stay informed and act upon security alerts and issues.
NI would like to thank 06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 working with Trend Micro Zero Day Initiative for reporting this issue and working with us on coordinated disclosure.
Product Version | Mitigation |
---|---|
LabVIEW 2024 | Install LabVIEW 2024 Q1 Patch 1 or later from NI Package Manager or Software Downloads |
LabVIEW 2023 | Install LabVIEW 2023 Q3 Patch 3 or later from NI Package Manager or Software Downloads |
LabVIEW 2022 | Install LabVIEW 2022 Q3 Patch 1 or later from NI Package Manager or Software Downloads |
LabVIEW 2021 | Install LabVIEW 2021 SP1 f2 or later from NI Package Manager or Software Downloads |
LabVIEW 2020 and prior | Not in Mainstream Support |