First published: Mon Mar 11 2024(Updated: )
An improper error handling vulnerability in LabVIEW may result in remote code execution. Successful exploitation requires an attacker to provide a user with a specially crafted VI. This vulnerability affects LabVIEW 2024 Q1 and prior versions.
Credit: security@ni.com
Affected Software | Affected Version | How to fix |
---|---|---|
National Instruments LabVIEW | <=2020 | |
National Instruments LabVIEW | =2021 | |
National Instruments LabVIEW | =2021-sp1 | |
National Instruments LabVIEW | =2022-q1 | |
National Instruments LabVIEW | =2022-q3 | |
National Instruments LabVIEW | =2023-q1 | |
National Instruments LabVIEW | =2023-q3 | |
National Instruments LabVIEW | =2023-q3_patch1 | |
National Instruments LabVIEW | =2023-q3_patch2 | |
National Instruments LabVIEW | =2024-q1 | |
NI LabVIEW | <2024 Q1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-23609 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2024-23609, update LabVIEW to version 2024 Q2 or later.
CVE-2024-23609 affects LabVIEW 2024 Q1 and prior versions.
An attacker could execute arbitrary code on a victim's machine by exploiting CVE-2024-23609.
Successful exploitation of CVE-2024-23609 requires the attacker to provide a user with a specially crafted VI.