Cyber Posture

CVE-2026-32862

High

Published: 07 April 2026

Published
07 April 2026
Modified
13 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 6.4th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32862 is a high-severity Out-of-bounds Write (CWE-787) vulnerability in Ni Labview. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 6.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-2 (Flaw Remediation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates CVE-2026-32862 by requiring timely identification, prioritization, and remediation of the out-of-bounds write flaw through vendor patches as detailed in the NI security advisory.

prevent

Implements memory protection mechanisms that defend against exploitation of the out-of-bounds write vulnerability for arbitrary code execution or information disclosure.

preventdetect

Deploys malicious code protection scanning at file entry points to identify and block specially crafted VI files exploiting the memory corruption vulnerability.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Memory corruption (out-of-bounds write) in LabVIEW client app enables RCE when user opens crafted VI file (T1203 Exploitation for Client Execution + T1204.002 Malicious File).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

There is a memory corruption vulnerability due to an out-of-bounds write in ResFileFactory::InitResourceMgr() in NI LabVIEW. This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially…

more

crafted VI file. This vulnerability affects NI LabVIEW 2026 Q1 (26.1.0) and prior versions.

Deeper analysisAI

CVE-2026-32862 is a memory corruption vulnerability caused by an out-of-bounds write in the ResFileFactory::InitResourceMgr() function in NI LabVIEW. This issue affects NI LabVIEW 2026 Q1 (version 26.1.0) and all prior versions, with an associated CWE-787 (Out-of-bounds Write). The vulnerability has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H).

An attacker can exploit this vulnerability by tricking a user into opening a specially crafted VI file, requiring local access but no privileges. Successful exploitation may result in information disclosure or arbitrary code execution, with high impacts to confidentiality, integrity, and availability on the affected system.

The National Instruments security advisory details available critical and security updates for memory corruption vulnerabilities in NI LabVIEW, including CVE-2026-32862. Practitioners should refer to https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/2026/memory-corruption-vulnerabilities-in-ni-labview.html for patch information and mitigation recommendations.

Details

CWE(s)

Affected Products

ni
labview
2023, 2024, 2025, 2026 · ≤ 2022

CVEs Like This One

CVE-2026-32860Same product: Ni Labview
CVE-2026-32861Same product: Ni Labview
CVE-2026-32864Same product: Ni Labview
CVE-2026-32863Same product: Ni Labview
CVE-2026-0954Same vendor: Ni
CVE-2026-0957Same vendor: Ni
CVE-2026-0955Same vendor: Ni
CVE-2025-2449Same vendor: Ni
CVE-2026-21327Shared CWE-787
CVE-2026-3094Shared CWE-787

References