Improper input validation in NI-PAL may allow a privileged user to potentially enable escalation of privilege via local access. This vulnerability is described in CVE-2021-38304.
Many NI drivers include NI-PAL and are affected by these vulnerabilities. Refer to the Mitigation Guidance section for identifying the version of NI-PAL installed and how to upgrade or install the patch.
NI strongly recommends that you upgrade or install the patch.
NI-PAL is a common component in many NI drivers. You only need to upgrade one NI driver that includes this component, or install the patch once per machine. The patch is backwards compatible with previous versions of NI software.
This vulnerability affects NI-PAL versions earlier than 20.0.1f0. To determine the version of NI-PAL installed, follow the instructions for your operating system.
If the NI-PAL version is earlier than 20.0.1f0, continue below to upgrade the NI driver version.
NI-VISA and NI-488.2 are the only drivers affected by this vulnerability on MacOS. Since NI-PAL is shared component, you only need to upgrade one of the drivers to version 21.0 or later.
CVE-2021-38304 - 8.2 - CVSS:3.1/ AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
NI would like to thank Michael Kenney (@bzyo_) for reporting this issue.
At NI, we view the security of our products as an important part of our commitment to our customers. Go to ni.com/security to stay informed and act upon security alerts and issues.