{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T03:04:52.611","vulnerabilities":[{"cve":{"id":"CVE-2024-23609","sourceIdentifier":"security@ni.com","published":"2024-03-11T16:15:08.157","lastModified":"2025-02-27T18:11:32.143","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"An improper error handling vulnerability in LabVIEW may result in remote code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted VI.  This vulnerability affects LabVIEW 2024 Q1 and prior versions."},{"lang":"es","value":"Una vulnerabilidad de manejo incorrecto de errores en LabVIEW puede resultar en la ejecución remota de código. La explotación exitosa requiere que un atacante proporcione al usuario un VI especialmente manipulado. Esta vulnerabilidad afecta a LabVIEW 2024 Q1 y versiones anteriores."}],"metrics":{"cvssMetricV31":[{"source":"security@ni.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@ni.com","type":"Secondary","description":[{"lang":"en","value":"CWE-1285"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*","versionEndIncluding":"2020","matchCriteriaId":"E9BBCA76-7B4C-4CC5-A782-489CA4223C04"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2021:-:*:*:-:*:*:*","matchCriteriaId":"F46539B2-9084-45E3-B9D6-447C9E002C0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2021:sp1:*:*:*:*:*:*","matchCriteriaId":"BF28259A-30A6-4BB1-B262-A006AB74AFFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*","matchCriteriaId":"4D12D6CF-802F-47BA-ADF9-9E52C071BD7F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*","matchCriteriaId":"340F61E5-D1ED-4C29-A894-8BC5C5B90ACE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*","matchCriteriaId":"D7DD2022-CFB7-4F38-B459-C1AFB55B5B68"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*","matchCriteriaId":"18AB0B07-72FE-4861-B69D-AD2E87C5382E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*","matchCriteriaId":"91928C9C-F094-4EE4-9FBE-2B7956D68E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*","matchCriteriaId":"044C4B51-C641-41F2-ACA0-834C99D63285"},{"vulnerable":true,"criteria":"cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*","matchCriteriaId":"7753CCDF-BAF8-4F91-B85B-EBB2B88F6F30"}]}]}],"references":[{"url":"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html","source":"security@ni.com","tags":["Vendor Advisory"]},{"url":"https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/improper-error-handling-issues-in-labview.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}