Skip to content
Threat Feed
high advisory

NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)

A memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.

A critical memory corruption vulnerability (CVE-2026-32863) exists in National Instruments (NI) LabVIEW, specifically within the sentry_transaction_context_set_operation() function. This out-of-bounds read vulnerability can be exploited by an attacker who successfully convinces a LabVIEW user to open a malicious, specially crafted VI file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or even allow for arbitrary code execution, granting the attacker control over the affected system. The vulnerability affects NI LabVIEW 2026 Q1 (version 26.1.0) and all prior versions, posing a risk to a wide range of users in industrial, scientific, and engineering sectors that rely on LabVIEW for automation and data acquisition.

Attack Chain

  1. Craft Malicious VI File: The attacker crafts a malicious VI (Virtual Instrument) file designed to trigger the out-of-bounds read in sentry_transaction_context_set_operation(). This likely involves manipulating the structure of the VI file to contain invalid or unexpected data.
  2. Social Engineering: The attacker uses social engineering techniques to convince a LabVIEW user to open the malicious VI file. This could involve sending the file as an email attachment, hosting it on a website, or any other method of tricking the user into opening the file within LabVIEW.
  3. VI File Opened: The user opens the malicious VI file using NI LabVIEW (version 26.1.0 or earlier).
  4. sentry_transaction_context_set_operation() Triggered: When LabVIEW attempts to process the crafted VI file, the sentry_transaction_context_set_operation() function is called with the manipulated data.
  5. Out-of-Bounds Read: The vulnerability in sentry_transaction_context_set_operation() is triggered, leading to an out-of-bounds read. This could involve reading memory outside of the intended buffer or data structure.
  6. Information Disclosure or Code Execution: The out-of-bounds read leads to either information disclosure (leaking sensitive data from memory) or arbitrary code execution (allowing the attacker to execute malicious code on the system), depending on how the memory corruption is handled.
  7. Persistence/Lateral Movement (If Code Execution): If the attacker achieves code execution, they may attempt to establish persistence on the system (e.g., by creating a scheduled task or modifying startup files) and/or move laterally to other systems on the network.
  8. Achieve Objective: The attacker leverages the compromised system to achieve their ultimate objective, which could include stealing data, disrupting operations, or using the system as a launchpad for further attacks.

Impact

Successful exploitation of CVE-2026-32863 can have severe consequences. Information disclosure could expose sensitive data related to industrial processes, research data, or proprietary algorithms. Arbitrary code execution would allow attackers to gain full control over the affected LabVIEW system, potentially disrupting critical operations, manipulating data, or causing physical damage in automated systems. While the exact number of victims is unknown, the wide use of NI LabVIEW across various industries (manufacturing, aerospace, research, etc.) means that a successful, widespread attack could have a significant impact.

Recommendation

Detection coverage 2

LabVIEW Suspicious Child Process

high

Detects LabVIEW spawning a suspicious child process, potentially indicating code execution after successful exploitation of CVE-2026-32863.

sigma tactics: execution techniques: T1059.001 sources: process_creation, windows

LabVIEW Network Connection by Uncommon Process

medium

Detects network connections initiated by LabVIEW child processes outside the standard installation directory, which may indicate post-exploitation activity.

sigma tactics: command_and_control techniques: T1071.001 sources: network_connection, windows

Detection queries are kept inside the platform. Get full rules →