CVE-2026-0956
Published: 13 March 2026
Summary
CVE-2026-0956 is a high-severity Out-of-bounds Read (CWE-125) vulnerability in Ni Dasylab. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 4.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 requires organizations to remediate flaws, including this out-of-bounds read vulnerability in DASYLab, through timely patching as provided in the vendor advisory.
SI-16 employs memory protections like DEP and ASLR to prevent arbitrary code execution resulting from memory corruption vulnerabilities such as this out-of-bounds read.
SI-10 enforces input validation on files loaded by DASYLab to mitigate out-of-bounds reads from specially crafted corrupted files.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability is directly exploited by tricking a user into opening a malicious crafted file, enabling arbitrary code execution.
NVD Description
There is a memory corruption vulnerability due to an out-of-bounds read when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to…
more
open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab.
Deeper analysisAI
CVE-2026-0956 is a memory corruption vulnerability stemming from an out-of-bounds read in Digilent DASYLab when loading a corrupted file. This flaw affects all versions of the software and is associated with CWE-125. It carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to potential impacts on confidentiality, integrity, and availability.
An attacker can exploit this vulnerability by convincing a local user to open a specially crafted file in Digilent DASYLab, requiring no privileges but relying on user interaction. Successful exploitation may result in information disclosure or arbitrary code execution on the affected system.
The National Instruments security advisory provides information on available critical and security updates for addressing out-of-bounds read vulnerabilities in Digilent DASYLab, accessible at https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/out-of-bounds-read-vulnerabilities-in-digilent-dasylab.html.
Details
- CWE(s)