Deserialization Flaw in NI DAQExpress Leading to Remote Code Execution
CVE-2024-12741

8.4HIGH

Key Information:

Vendor

Ni

Vendor
CVE Published:
18 December 2024

What is CVE-2024-12741?

CVE-2024-12741 is a security vulnerability identified in NI DAQExpress, a software tool designed for data acquisition and measurement. This vulnerability arises from a deserialization flaw, which allows untrusted data to be processed inappropriately, leading to the potential for remote code execution. If exploited, attackers can manipulate users into opening a compromised project file, which can seriously undermine an organization’s security posture. Given that DAQExpress is an end-of-life product with no further updates, organizations using this software face increased risks from this vulnerability.

Technical Details

The vulnerability involves a flaw in the way NI DAQExpress handles deserialization of data from project files. Specifically, when a user opens a specially crafted project file, the software could allow the execution of unauthorized code, potentially giving attackers control over the affected system. This makes it essential for users to be cautious about the project files they open, especially if received from untrusted sources.

Potential Impact of CVE-2024-12741

  1. Remote Code Execution: The primary risk associated with this vulnerability is the ability for attackers to execute arbitrary code remotely. This can lead to unauthorized access and control, allowing attackers to manipulate data, steal sensitive information, or deploy further exploits.

  2. Data Compromise: Successful exploitation could result in the breach of confidential data, including proprietary information or industrial control systems. This could severely impact an organization’s operational integrity and lead to significant financial and reputational damage.

  3. Increased Attack Surface: Since DAQExpress is no longer receiving updates or patches, the presence of this vulnerability suggests that any organization continuing to use the software is at a heightened risk of being targeted by cyberattacks, thereby necessitating an urgent review of their software dependencies and security policies.

Affected Version(s)

DAQExpress Windows 0

References

CVSS V4

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

.