<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Labview — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/labview/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/labview/feed.xml" rel="self" type="application/rss+xml"/><item><title>NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32864)</title><link>https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</link><pubDate>Wed, 08 Apr 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-labview-oob-read/</guid><description>A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds read in mgcore_SH_25_3!aligned_free(), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted VI file.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability, identified as CVE-2026-32864, exists within National Instruments (NI) LabVIEW software. The flaw is triggered by an out-of-bounds read within the <code>mgcore_SH_25_3!aligned_free()</code> function. An attacker can exploit this vulnerability by enticing a user to open a specially crafted VI (Virtual Instrument) file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or arbitrary code execution, granting the attacker control over the affected system. This vulnerability affects NI LabVIEW versions 2026 Q1 (26.1.0) and all prior versions, making a wide range of LabVIEW installations susceptible.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker crafts a malicious LabVIEW VI file designed to trigger the out-of-bounds read in <code>mgcore_SH_25_3!aligned_free()</code>.</li>
<li>The attacker uses social engineering to convince a victim to open the specially crafted VI file.</li>
<li>The victim opens the malicious VI file using a vulnerable version of NI LabVIEW (2026 Q1 (26.1.0) and prior).</li>
<li>LabVIEW attempts to process the malformed data within the VI file.</li>
<li>The <code>mgcore_SH_25_3!aligned_free()</code> function is called during the VI file processing.</li>
<li>The out-of-bounds read occurs when <code>aligned_free()</code> attempts to access memory outside of allocated bounds.</li>
<li>Depending on the memory layout, this can lead to information disclosure by leaking memory contents, or arbitrary code execution by overwriting critical data.</li>
<li>If arbitrary code execution is achieved, the attacker can then install malware, exfiltrate data, or perform other malicious actions on the compromised system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32864 can have serious consequences. Information disclosure could expose sensitive data processed by LabVIEW, such as measurement data, control algorithms, or proprietary code. Arbitrary code execution would allow an attacker to gain complete control over the affected system, enabling them to install malware, steal data, or disrupt operations. The vulnerability affects a broad range of LabVIEW users, potentially impacting industrial control systems, research and development environments, and other critical applications.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided by National Instruments for CVE-2026-32864 to remediate the out-of-bounds read vulnerability. Refer to the NI security advisory for specific instructions.</li>
<li>Deploy the Sigma rule <code>LabVIEW_Suspicious_VI_File_Open</code> to detect suspicious LabVIEW VI files being opened based on file path or other attributes.</li>
<li>Monitor process creation events for <code>LabVIEW.exe</code> spawning unusual child processes or accessing unusual network resources after a VI file has been opened, which could indicate successful code execution (see <code>LabVIEW_Suspicious_Child_Process</code> rule).</li>
<li>Educate users about the risks of opening untrusted VI files and emphasize the importance of verifying the source of any VI file before opening it.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32864</category><category>labview</category><category>memory-corruption</category><category>out-of-bounds-read</category></item><item><title>NI LabVIEW Out-of-Bounds Read Vulnerability (CVE-2026-32863)</title><link>https://feed.craftedsignal.io/briefs/2026-04-ni-labview-oob-read/</link><pubDate>Tue, 07 Apr 2026 20:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-ni-labview-oob-read/</guid><description>A memory corruption vulnerability due to an out-of-bounds read in NI LabVIEW's `sentry_transaction_context_set_operation()` function could lead to information disclosure or arbitrary code execution by opening a specially crafted VI file.</description><content:encoded><![CDATA[<p>A critical memory corruption vulnerability (CVE-2026-32863) exists in National Instruments (NI) LabVIEW, specifically within the <code>sentry_transaction_context_set_operation()</code> function. This out-of-bounds read vulnerability can be exploited by an attacker who successfully convinces a LabVIEW user to open a malicious, specially crafted VI file. Successful exploitation could lead to information disclosure, potentially exposing sensitive data handled by LabVIEW, or even allow for arbitrary code execution, granting the attacker control over the affected system. The vulnerability affects NI LabVIEW 2026 Q1 (version 26.1.0) and all prior versions, posing a risk to a wide range of users in industrial, scientific, and engineering sectors that rely on LabVIEW for automation and data acquisition.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li><strong>Craft Malicious VI File:</strong> The attacker crafts a malicious VI (Virtual Instrument) file designed to trigger the out-of-bounds read in <code>sentry_transaction_context_set_operation()</code>. This likely involves manipulating the structure of the VI file to contain invalid or unexpected data.</li>
<li><strong>Social Engineering:</strong> The attacker uses social engineering techniques to convince a LabVIEW user to open the malicious VI file. This could involve sending the file as an email attachment, hosting it on a website, or any other method of tricking the user into opening the file within LabVIEW.</li>
<li><strong>VI File Opened:</strong> The user opens the malicious VI file using NI LabVIEW (version 26.1.0 or earlier).</li>
<li><strong><code>sentry_transaction_context_set_operation()</code> Triggered:</strong> When LabVIEW attempts to process the crafted VI file, the <code>sentry_transaction_context_set_operation()</code> function is called with the manipulated data.</li>
<li><strong>Out-of-Bounds Read:</strong> The vulnerability in <code>sentry_transaction_context_set_operation()</code> is triggered, leading to an out-of-bounds read. This could involve reading memory outside of the intended buffer or data structure.</li>
<li><strong>Information Disclosure or Code Execution:</strong> The out-of-bounds read leads to either information disclosure (leaking sensitive data from memory) or arbitrary code execution (allowing the attacker to execute malicious code on the system), depending on how the memory corruption is handled.</li>
<li><strong>Persistence/Lateral Movement (If Code Execution):</strong> If the attacker achieves code execution, they may attempt to establish persistence on the system (e.g., by creating a scheduled task or modifying startup files) and/or move laterally to other systems on the network.</li>
<li><strong>Achieve Objective:</strong> The attacker leverages the compromised system to achieve their ultimate objective, which could include stealing data, disrupting operations, or using the system as a launchpad for further attacks.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32863 can have severe consequences. Information disclosure could expose sensitive data related to industrial processes, research data, or proprietary algorithms. Arbitrary code execution would allow attackers to gain full control over the affected LabVIEW system, potentially disrupting critical operations, manipulating data, or causing physical damage in automated systems. While the exact number of victims is unknown, the wide use of NI LabVIEW across various industries (manufacturing, aerospace, research, etc.) means that a successful, widespread attack could have a significant impact.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately update NI LabVIEW to a version that is not affected by CVE-2026-32863, as detailed in the NI security advisory (<a href="https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/memory-corruption-vulnerabilities-in-ni-labview.html">https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/memory-corruption-vulnerabilities-in-ni-labview.html</a>).</li>
<li>Implement user awareness training to educate LabVIEW users about the risks of opening untrusted VI files and the potential for social engineering attacks.</li>
<li>Monitor process creation events for LabVIEW (<code>LabVIEW.exe</code>) spawning unusual child processes, as this could indicate successful code execution following exploitation. Deploy a Sigma rule such as the one provided to detect this behavior.</li>
<li>Enable and review process execution logs for <code>LabVIEW.exe</code> and related processes.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32863</category><category>labview</category><category>out-of-bounds read</category><category>memory corruption</category><category>arbitrary code execution</category><category>information disclosure</category></item><item><title>NI LabVIEW LVLIB File Parsing Memory Corruption Vulnerability (CVE-2026-32860)</title><link>https://feed.craftedsignal.io/briefs/2026-04-labview-lvlib-vuln/</link><pubDate>Tue, 07 Apr 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-labview-lvlib-vuln/</guid><description>A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVLIB file, potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvlib file.</description><content:encoded><![CDATA[<p>CVE-2026-32860 is a vulnerability affecting NI LabVIEW versions 2026 Q1 (26.1.0) and prior. The vulnerability stems from an out-of-bounds write condition encountered during the loading of a corrupted LVLIB (LabVIEW Library) file. An attacker could exploit this flaw by crafting a malicious .lvlib file and enticing a user to open it within LabVIEW. Successful exploitation could lead to memory corruption, potentially enabling information disclosure or the execution of arbitrary code within the context of the LabVIEW application. This poses a significant risk to systems running vulnerable versions of LabVIEW, particularly those handling or processing potentially untrusted LVLIB files.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker crafts a malicious .lvlib file containing corrupted data designed to trigger the out-of-bounds write.</li>
<li>The attacker uses social engineering or other means to convince a victim to open the malicious .lvlib file in NI LabVIEW.</li>
<li>The victim opens the .lvlib file within NI LabVIEW.</li>
<li>LabVIEW attempts to parse the corrupted data within the .lvlib file.</li>
<li>During the parsing process, the out-of-bounds write vulnerability is triggered due to the malformed data.</li>
<li>Memory corruption occurs, potentially overwriting critical program data or code.</li>
<li>Depending on the overwritten memory, the attacker may achieve information disclosure by reading sensitive data.</li>
<li>Alternatively, the attacker may achieve arbitrary code execution by overwriting code pointers or injecting malicious code into memory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32860 can lead to both information disclosure and arbitrary code execution on affected systems. An attacker exploiting this vulnerability could potentially gain unauthorized access to sensitive data processed or stored by LabVIEW, or completely compromise the affected system by executing malicious code. The impact is significant, especially in industrial control systems and other critical infrastructure environments where LabVIEW is commonly used, as it could lead to disruption of services, data breaches, or even physical damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by National Instruments as described in the advisory at <a href="https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/lv-project-library-file-parsing-memory-corruption-vulnerability-in-ni-labview.html">https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/lv-project-library-file-parsing-memory-corruption-vulnerability-in-ni-labview.html</a> to remediate CVE-2026-32860.</li>
<li>Implement strict file handling procedures and user awareness training to prevent users from opening untrusted .lvlib files received from external sources.</li>
<li>Monitor process execution for unusual or unexpected activity originating from LabVIEW processes, which could indicate successful exploitation of this or other vulnerabilities.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32860</category><category>labview</category><category>memory corruption</category><category>out-of-bounds write</category><category>lvlib</category></item><item><title>NI LabVIEW LVCLASS File Parsing Out-of-Bounds Write Vulnerability (CVE-2026-32861)</title><link>https://feed.craftedsignal.io/briefs/2026-04-labview-lvclass-oob-write/</link><pubDate>Tue, 07 Apr 2026 20:16:24 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-labview-lvclass-oob-write/</guid><description>A memory corruption vulnerability exists in NI LabVIEW due to an out-of-bounds write when loading a corrupted LVCLASS file (CVE-2026-32861), potentially leading to information disclosure or arbitrary code execution if a user opens a specially crafted .lvclass file.</description><content:encoded><![CDATA[<p>A memory corruption vulnerability has been identified in NI LabVIEW versions 2026 Q1 (26.1.0) and prior. This vulnerability, tracked as CVE-2026-32861, stems from an out-of-bounds write that occurs when the software attempts to load a malformed LVCLASS file. An attacker could exploit this vulnerability by crafting a malicious .lvclass file and convincing a user to open it within LabVIEW. Successful exploitation of this vulnerability could allow an attacker to achieve arbitrary code execution or disclose sensitive information from the affected system. This poses a significant risk to organizations using LabVIEW for critical applications, as it could lead to system compromise and data breaches.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker crafts a malicious .lvclass file containing an out-of-bounds write payload.</li>
<li>The attacker delivers the crafted .lvclass file to the victim via social engineering or other delivery methods.</li>
<li>The victim, using a vulnerable version of NI LabVIEW, opens the malicious .lvclass file.</li>
<li>LabVIEW attempts to parse the LVCLASS file, triggering the out-of-bounds write vulnerability.</li>
<li>The out-of-bounds write corrupts memory, potentially overwriting critical data structures or code.</li>
<li>If the overwritten memory contains attacker-controlled code, it could lead to arbitrary code execution.</li>
<li>The attacker gains control of the LabVIEW process and potentially the entire system.</li>
<li>The attacker performs malicious actions, such as data exfiltration, installing backdoors, or further compromising the system.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-32861 can lead to information disclosure and arbitrary code execution on systems running vulnerable versions of NI LabVIEW. This could allow an attacker to steal sensitive data, install malware, or gain complete control of the affected system. The impact of this vulnerability is significant, especially for organizations using LabVIEW in critical infrastructure or industrial control systems, potentially leading to operational disruption, financial loss, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the security patch provided by National Instruments to address CVE-2026-32861 on all systems running NI LabVIEW 2026 Q1 (26.1.0) and prior versions. Refer to the NI advisory for download links: <a href="https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/lv-class-file-parsing-memory-corruption-vulnerability-in-ni-labview.html">https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/lv-class-file-parsing-memory-corruption-vulnerability-in-ni-labview.html</a>.</li>
<li>Implement user awareness training to educate users about the risks of opening files from untrusted sources to mitigate the initial access vector.</li>
<li>Deploy the Sigma rule <code>DetectSuspiciousLvclassFileOpen</code> to detect suspicious LabVIEW process opening LVCLASS files.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>cve-2026-32861</category><category>labview</category><category>out-of-bounds write</category><category>memory corruption</category></item></channel></rss>