First published: Thu May 15 2025(Updated: )
There is a memory corruption vulnerability due to a stack-based buffer overflow in DrObjectStorage::XML_Serialize() when using the SymbolEditor in NI Circuit Design Suite. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.0 and prior versions.
Credit: security@ni.com
Affected Software | Affected Version | How to fix |
---|---|---|
NI Circuit Design Suite | <14.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-30421 is considered a critical severity vulnerability due to its potential for information disclosure and arbitrary code execution.
To fix CVE-2025-30421, update your NI Circuit Design Suite to version 14.3.0 or later.
CVE-2025-30421 affects the NI Circuit Design Suite up to version 14.3.0.
CVE-2025-30421 is a memory corruption vulnerability resulting from a stack-based buffer overflow.
Exploitation of CVE-2025-30421 could lead to information disclosure or the execution of arbitrary code.