
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2025-2631 is an out-of-bounds write vulnerability discovered in NI LabVIEW's InitCPUInformation() function. The vulnerability affects NI LabVIEW 2025 Q1 and prior versions. This security flaw was discovered by Michael Heinzl and reported through CISA. The vulnerability was disclosed on April 9, 2025 (NVD, CISA).
The vulnerability is classified as an out-of-bounds write (CWE-787) due to improper bounds checking in the InitCPUInformation() function. It has received a CVSS v3.1 base score of 7.8 (HIGH) with vector string AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H, and a CVSS v4.0 score of 8.5 (HIGH) with vector string AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N (NI Security, CISA).
Successful exploitation of this vulnerability could result in information disclosure or arbitrary code execution on affected systems. The vulnerability affects critical manufacturing sectors worldwide, potentially compromising industrial control systems that use LabVIEW (CISA).
National Instruments has released patches to address this vulnerability. Users are strongly recommended to upgrade to LabVIEW 2025 Q1 Patch 2 or later, LabVIEW 2024 Q3 Patch 3 or later, LabVIEW 2023 Q3 Patch 6 or later, or LabVIEW 2022 Q3 Patch 5 or later, depending on their current version. CISA recommends minimizing network exposure for control system devices, ensuring they are not accessible from the Internet, and using secure methods such as VPNs when remote access is required (NI Security, CISA).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."