Impact
The vulnerability is an out‑of‑bounds read that occurs when Digilent DASYLab parses a corrupted project file. The memory corruption can expose sensitive data and, as the description states, may lead to arbitrary code execution. The weakness is classified as CWE‑125, indicating a buffer boundary overrun that allows reading memory outside the intended bounds.
Affected Systems
All released versions of Digilent DASYLab are affected. The affected product is listed by the CNA as Digilent:DASYLab and is represented by the CPE string cpe:2.3:a:ni:dasylab:*:*:*:*:*:*:*:*.
Risk and Exploitability
The CVSS score of 8.5 classifies the vulnerability as High severity. The EPSS score is reported as less than 1%, suggesting a low probability of seeing widespread exploitation at present. The vulnerability is not included in the CISA KEV catalog. Exploitation requires a victim to voluntarily open a specially crafted file, implying that it is a user‑interaction attack vector. No public exploits are known, but the combination of high impact and low exploitation likelihood does not lessen the need for prompt mitigation because a successful attack could lead to information disclosure or code execution.
OpenCVE Enrichment