<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-32864 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-32864/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-32864/feed.xml" rel="self" type="application/rss+xml"/><item><title>NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)</title><link>https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</guid><description>A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability, identified as CVE-2026-32864, exists within National Instruments (NI) LabVIEW software. The flaw is triggered by an out-of-bounds read within the <code>mgcore_SH_25_3!aligned_free()</code> function. An attacker can exploit this vulnerability by enticing a user to open a specially crafted VI (Virtual Instrument) file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or arbitrary code execution, granting the attacker control over the affected system. This vulnerability affects NI LabVIEW versions 2026 Q1 (26.1.0) and all prior versions, making a wide range of LabVIEW installations susceptible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious LabVIEW VI file designed to trigger the out-of-bounds read in <code>mgcore_SH_25_3!aligned_free()</code>.</li>
<li>The attacker uses social engineering to convince a victim to open the specially crafted VI file.</li>
<li>The victim opens the malicious VI file using a vulnerable version of NI LabVIEW (2026 Q1 (26.1.0) and prior).</li>
<li>LabVIEW attempts to process the malformed data within the VI file.</li>
<li>The <code>mgcore_SH_25_3!aligned_free()</code> function is called during the VI file processing.</li>
<li>The out-of-bounds read occurs when <code>aligned_free()</code> attempts to access memory outside of allocated bounds.</li>
<li>Depending on the memory layout, this can lead to information disclosure by leaking memory contents, or arbitrary code execution by overwriting critical data.</li>
<li>If arbitrary code execution is achieved, the attacker can then install malware, exfiltrate data, or perform other malicious actions on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32864 can have serious consequences. Information disclosure could expose sensitive data processed by LabVIEW, such as measurement data, control algorithms, or proprietary code. Arbitrary code execution would allow an attacker to gain complete control over the affected system, enabling them to install malware, steal data, or disrupt operations. The vulnerability affects a broad range of LabVIEW users, potentially impacting industrial control systems, research and development environments, and other critical applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by National Instruments for CVE-2026-32864 to remediate the out-of-bounds read vulnerability. Refer to the NI security advisory for specific instructions.</li>
<li>Deploy the Sigma rule <code>LabVIEW_Suspicious_VI_File_Open</code> to detect suspicious LabVIEW VI files being opened based on file path or other attributes.</li>
<li>Monitor process creation events for <code>LabVIEW.exe</code> spawning unusual child processes or accessing unusual network resources after a VI file has been opened, which could indicate successful code execution (see <code>LabVIEW_Suspicious_Child_Process</code> rule).</li>
<li>Educate users about the risks of opening untrusted VI files and emphasize the importance of verifying the source of any VI file before opening it.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32864</category><category>labview</category><category>memory-corruption</category><category>out-of-bounds-read</category></item></channel></rss>