HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Remote Code Execution in NI LabVIEW LVLIB Parsing (CVE-2026-32860) Threatens Engineering Workflows

A memory‑corruption flaw in NI LabVIEW's LVLIB parser (CVE‑2026‑32860) enables remote code execution when a victim opens a crafted file. The vulnerability scores 7.8 (High) and affects all pre‑patched LabVIEW installations, creating a supply‑chain risk for organizations that rely on NI software for design and test.

🛡️ LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
5 recommended
📰
Source
zerodayinitiative.com

Remote Code Execution in NI LabVIEW LVLIB Parsing (CVE‑2026‑32860) Threatens Engineering Workflows

What It Is – A memory‑corruption flaw in the LVLIB file parser of National Instruments (NI) LabVIEW allows an attacker to execute arbitrary code on the host system. The vulnerability is tracked as CVE‑2026‑32860.

Exploitability – Remote exploitation is possible once a victim opens a crafted LVLIB file or visits a malicious page that triggers the parser. A proof‑of‑concept exists; CVSS 7.8 (High).

Affected Products – NI LabVIEW (all versions prior to the April 2026 security update).

TPRM Impact – LabVIEW is widely used in product design, test automation, and data acquisition across manufacturing, aerospace, and research firms. A compromised LabVIEW installation can serve as a foothold for supply‑chain attacks, potentially exposing proprietary designs, test data, and downstream partner systems.

Recommended Actions

  • Deploy NI’s security update for LabVIEW immediately.
  • Enforce strict file‑type controls; block LVLIB files from untrusted sources.
  • Conduct a rapid inventory of all LabVIEW installations within your vendor ecosystem.
  • Verify that endpoint protection solutions can detect anomalous LVLIB parsing activity.
  • Review incident response playbooks to include malicious LabVIEW payload scenarios.

Source: Zero Day Initiative Advisory – ZDI‑26‑290

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-290/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.