Impact
A memory corruption vulnerability exists in Digilent DASYLab when a user opens a specially crafted corrupted file. The flaw manifests as an out‑of‑bounds read (CWE-125), which can lead to information disclosure or arbitrary code execution. The vulnerability arises from improper bounds checking during file parsing, allowing an attacker to read memory beyond the intended buffer.
Affected Systems
All versions of Digilent DASYLab are affected. The CPE identifier for affected products is cpe:2.3:a:ni:dasylab:*:*:*:*:*:*:*:*. No version‑specific exclusions are listed.
Risk and Exploitability
The CVSS score is 8.5, indicating a high severity. The EPSS score is less than 1%, suggesting the probability of exploitation is low. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires a user to open a malicious file, so the attack vector is local and relies on social engineering. The overall risk is high but the likelihood of real‑world exploitation remains low.
OpenCVE Enrichment