CVE-2026-0957
Published: 13 March 2026
Summary
CVE-2026-0957 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Ni Dasylab. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Malicious File (T1204.002); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the out-of-bounds write vulnerability by requiring timely remediation through installation of vendor-provided patches detailed in the NI security advisory for all affected DASYLab versions.
Implements memory protection mechanisms like address space layout randomization and data execution prevention to block exploitation of memory corruption from out-of-bounds writes.
Enforces validation and error handling for file inputs to reject specially crafted corrupted files before they trigger the out-of-bounds write in DASYLab.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Out-of-bounds write in file parser enables RCE when user opens malicious crafted file (direct match to malicious file user execution).
NVD Description
There is a memory corruption vulnerability due to an out-of-bounds write when loading a corrupted file in Digilent DASYLab. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to…
more
open a specially crafted file. This vulnerability affects all versions of Digilent DASYLab.
Deeper analysisAI
CVE-2026-0957 is a memory corruption vulnerability stemming from an out-of-bounds write in Digilent DASYLab when loading a corrupted file. This flaw affects all versions of the software and is classified under CWE-787, with a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).
An attacker can exploit this vulnerability by tricking a user into opening a specially crafted file, enabling local access with no required privileges but relying on user interaction. Successful exploitation may lead to information disclosure or arbitrary code execution on the affected system.
The National Instruments security advisory at https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/out-of-bounds-write-vulnerabilities-in-digilent-dasylab.html details available critical and security updates addressing this out-of-bounds write vulnerability in Digilent DASYLab.
Details
- CWE(s)