There is a memory corruption vulnerability due to an out of bounds write in XML_Serialize() when using SymbolEditor in NI Circuit Design Suite.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.1 and prior versions.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-31746 There is a memory corruption vulnerability due to an out of bounds write in XML_Serialize() when using SymbolEditor in NI Circuit Design Suite.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.1 and prior versions.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 07 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:ni:circuit_design_suite:*:*:*:*:*:*:*:*

Thu, 02 Oct 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Ni
Ni circuit Design Suite
Vendors & Products Ni
Ni circuit Design Suite

Tue, 30 Sep 2025 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Description There is a memory corruption vulnerability due to an out of bounds write in XML_Serialize() when using SymbolEditor in NI Circuit Design Suite.  This vulnerability may result in information disclosure or arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability affects NI Circuit Design Suite 14.3.1 and prior versions.
Title Memory Corruption issue in XML_Serialize() in NI Circuit Design Suite
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 7.8, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NI

Published:

Updated: 2025-10-01T03:56:00.283Z

Reserved: 2025-06-12T16:24:46.307Z

Link: CVE-2025-6033

cve-icon Vulnrichment

Updated: 2025-09-30T17:10:48.910Z

cve-icon NVD

Status : Analyzed

Published: 2025-09-30T16:15:53.480

Modified: 2025-10-07T13:24:30.283

Link: CVE-2025-6033

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-10-02T08:46:20Z