HomeIntelligenceBrief
🛡️ VULNERABILITY BRIEF🟠 High🛡️ Vulnerability

Critical Remote Code Execution in NI LabVIEW (CVE-2026-32861) via LVCLASS File Parsing

A memory‑corruption flaw in NI LabVIEW's LVCLASS file parser (CVE‑2026‑32861) enables remote code execution when a victim opens a crafted file or visits a malicious page. The vulnerability scores 7.8 (High) on CVSS and poses a supply‑chain risk for organizations that rely on LabVIEW for engineering and research.

🛡️ LiveThreat™ Intelligence · 📅 April 16, 2026· 📰 zerodayinitiative.com
🟠
Severity
High
🛡️
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
3 sector(s)
Actions
4 recommended
📰
Source
zerodayinitiative.com

Critical Remote Code Execution in NI LabVIEW (CVE‑2026‑32861) via LVCLASS File Parsing

What It Is – A memory‑corruption flaw in the LVCLASS file parser of National Instruments LabVIEW allows an attacker to execute arbitrary code in the context of the LabVIEW process. The vulnerability (CVE‑2026‑32861) scores 7.8 (High) on CVSS 3.1.

Exploitability – Exploitation requires a victim to open a malicious LVCLASS file or visit a crafted web page that triggers the parser. No public exploit code is known, but the low attack complexity and high impact make it a prime target for weaponisation.

Affected Products – NI LabVIEW (all versions that accept LVCLASS files prior to the 2026 security update).

TPRM Impact – LabVIEW is widely used for engineering, scientific research, and product development across many supply‑chain tiers. A compromised LabVIEW installation can lead to the injection of malicious code into downstream firmware, CAD models, or proprietary algorithms, exposing intellectual property and creating a vector for broader supply‑chain attacks.

Recommended Actions

  • Deploy NI’s security update for LabVIEW immediately.
  • Block or sandbox LVCLASS files from untrusted sources (email, web downloads, USB).
  • Enforce application‑allow‑list policies on engineering workstations.
  • Monitor process‑creation events for unexpected LabVIEW activity and enable EDR alerts for memory‑corruption exploits.
  • Review third‑party contracts that rely on LabVIEW‑generated artifacts and require vendors to confirm patch compliance.

Source: Zero Day Initiative Advisory ZDI‑26‑291

📰 Original Source
http://www.zerodayinitiative.com/advisories/ZDI-26-291/

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

🛡️

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.