Vulnerabilites related to ni - flexlogger
Vulnerability from fkie_nvd
Published
2022-04-21 05:15
Modified
2024-11-21 06:55
Summary
There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r2:*:*:*:*:*:*",
              "matchCriteriaId": "CE96AE31-D36F-446A-96A5-46C762818A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r3:*:*:*:*:*:*",
              "matchCriteriaId": "336F1E07-92EE-4BF5-AA14-981BFB67965C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r4:*:*:*:*:*:*",
              "matchCriteriaId": "7D3A4BF7-5BF0-4EE5-BF7C-8C514D6238B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:g_web_development_software:2021:*:*:*:-:*:*:*",
              "matchCriteriaId": "135688EB-A45C-4837-8ADC-CE0E0393457D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:g_web_development_software:2021:*:*:*:community:*:*:*",
              "matchCriteriaId": "EF01F242-0C8B-457E-8116-6B144AEB94C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2021:-:*:*:-:*:*:*",
              "matchCriteriaId": "F46539B2-9084-45E3-B9D6-447C9E002C0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:labview:2021:-:*:*:community:*:*:*",
              "matchCriteriaId": "BF15292D-3504-4386-BD9B-99A65FE22A2D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:static_test_software_suite:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "738E76CB-643A-424E-85B0-65B6CFEB24B0",
              "versionEndExcluding": "1.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:systemlink:2020:r4:*:*:*:*:*:*",
              "matchCriteriaId": "3C507CEF-2AB1-4CF7-A66F-D3EAABA1D626",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:systemlink:2022:r1:*:*:*:*:*:*",
              "matchCriteriaId": "10ED5155-30C4-4278-82EF-DDEC2C12E9D5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:systemlink:2022:r2:*:*:*:*:*:*",
              "matchCriteriaId": "670B26C0-2ECE-4AC9-A3C2-3340D8F02040",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later."
    },
    {
      "lang": "es",
      "value": "Se presenta una vulnerabilidad de tipo cross-site scripting (XSS) en un componente de NI Web Server instalado con varios productos de NI. Dependiendo del producto(s) en uso, la gu\u00eda de remediaci\u00f3n incluye: instalar SystemLink versi\u00f3n 2021 R3 o posterior, instalar FlexLogger 2022 Q2 o posterior, instalar LabVIEW 2021 SP1, instalar G Web Development 2022 R1 o posterior, o instalar Static Test Software Suite versi\u00f3n 1.2 o posterior"
    }
  ],
  "id": "CVE-2022-27237",
  "lastModified": "2024-11-21T06:55:28.160",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.1,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-04-21T05:15:06.800",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-08 16:15
Modified
2024-11-21 08:41
Summary
An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.
Impacted products
Vendor Product Version
ni topografix_data_plugin 2023
ni diadem 2014
ni diadem 2015
ni diadem 2015
ni diadem 2017
ni diadem 2017
ni diadem 2018
ni diadem 2018
ni diadem 2019
ni diadem 2019
ni diadem 2020
ni diadem 2020
ni diadem 2021
ni diadem 2021
ni diadem 2022
ni diadem 2022
ni diadem 2023
ni veristand 2013
ni veristand 2014
ni veristand 2015
ni veristand 2015
ni veristand 2016
ni veristand 2017
ni veristand 2018
ni veristand 2018
ni veristand 2019
ni veristand 2019
ni veristand 2019
ni veristand 2019
ni veristand 2020
ni veristand 2020
ni veristand 2020
ni veristand 2020
ni veristand 2020
ni veristand 2020
ni veristand 2021
ni veristand 2021
ni veristand 2021
ni veristand 2023
ni veristand 2023
ni veristand 2023
ni veristand 2023
ni flexlogger 2018
ni flexlogger 2018
ni flexlogger 2018
ni flexlogger 2018
ni flexlogger 2019
ni flexlogger 2019
ni flexlogger 2019
ni flexlogger 2019
ni flexlogger 2020
ni flexlogger 2020
ni flexlogger 2020
ni flexlogger 2020
ni flexlogger 2021
ni flexlogger 2021
ni flexlogger 2021
ni flexlogger 2021
ni flexlogger 2022
ni flexlogger 2022
ni flexlogger 2023
ni flexlogger 2023
ni flexlogger 2023
ni flexlogger 2023



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:topografix_data_plugin:2023:-:*:*:*:gpx:*:*",
              "matchCriteriaId": "15732407-23EA-4542-96A2-5C878FB8481F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:diadem:2014:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D2B3E07-5832-4ABE-B7F8-EDFFC91940E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2015:-:*:*:*:*:*:*",
              "matchCriteriaId": "B3D7F82A-8406-4B50-A9BA-CCB34A974F87",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2015:sp2:*:*:*:*:*:*",
              "matchCriteriaId": "5CA88F99-AE0F-4B98-B86A-4B5289520DA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2017:-:*:*:*:*:*:*",
              "matchCriteriaId": "7A59840A-5F72-4FB9-8B67-A91439E7DA1E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2017:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "2DBC89AC-5BA4-432B-96D8-57A5E9B6A338",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2018:-:*:*:*:*:*:*",
              "matchCriteriaId": "C853AE58-D3C8-4627-A0D8-542382650932",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2018:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "87C3A752-E66D-4F4C-B6FB-F572EAF092B0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2019:-:*:*:*:*:*:*",
              "matchCriteriaId": "3F41FF00-1098-43B3-822A-8AC92B991F20",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2019:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "3525F92B-30ED-4798-BF89-14D8EFCD7CC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "7D3458A8-E460-4297-A69F-C4DDE1D232F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2020:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "49A24A9A-8601-49DA-8E7D-798D2E399273",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2021:-:*:*:*:*:*:*",
              "matchCriteriaId": "4101C29B-BB75-47B6-9D2D-BC5491969EEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2021:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "10D8EBAC-D4CF-4841-AE65-5F8A1121788C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2022:q2:*:*:*:*:*:*",
              "matchCriteriaId": "7C10702F-B2C2-46FF-88FF-2A314B502ED4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2022:q4:*:*:*:*:*:*",
              "matchCriteriaId": "8C05E9A6-7B7D-4928-A60E-24942D4D51F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:diadem:2023:q2:*:*:*:*:*:*",
              "matchCriteriaId": "9044BC02-8801-4DBD-8529-49DB7F0D3452",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:veristand:2013:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "F499514A-19DE-469D-9EF6-F7EC1E6810BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2014:*:*:*:*:*:*:*",
              "matchCriteriaId": "D68D0C2C-C42D-4B8C-A3D6-93A136E5DD21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2015:-:*:*:*:*:*:*",
              "matchCriteriaId": "29FA2254-FF6C-4FCA-8363-B36E4C38C6BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2015:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "18577799-88E6-44C1-9477-3261EA98ED4F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2016:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA705301-337E-4162-8810-BF20B23CB9E5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2017:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5F1303A-A8D9-4E60-BB96-3B00AAAAD8A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2018:-:*:*:*:*:*:*",
              "matchCriteriaId": "4FAF54A5-268E-4A76-9C31-F3E2FE465464",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2018:sp1:*:*:*:*:*:*",
              "matchCriteriaId": "E98B7755-005F-4036-AF81-002F113DBCD6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2019:-:*:*:*:*:*:*",
              "matchCriteriaId": "55743F60-FA68-494E-87B9-8E22787EEF4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2019:r2:*:*:*:*:*:*",
              "matchCriteriaId": "2CA4257E-5E97-46D6-BE97-205F6FC18CA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2019:r3:*:*:*:*:*:*",
              "matchCriteriaId": "541008B0-5703-4937-9304-C09645454085",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2019:r3f1:*:*:*:*:*:*",
              "matchCriteriaId": "5970C421-B8B1-459F-85DB-E74A0B31EDCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:-:*:*:*:*:*:*",
              "matchCriteriaId": "55ADD725-44EE-4F28-B9A3-923094352C4C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:r2:*:*:*:*:*:*",
              "matchCriteriaId": "58D19502-B3F2-4D43-A4D2-CF6CD2E41E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:r3:*:*:*:*:*:*",
              "matchCriteriaId": "AAF6DE83-A202-4A90-8B05-735D686FDB8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:r4:*:*:*:*:*:*",
              "matchCriteriaId": "C90473FA-81CB-4984-8B4C-2EE907ED9DC0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:r5:*:*:*:*:*:*",
              "matchCriteriaId": "B09E4798-97D8-41B7-9E3C-A5D45F8C8CB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2020:r6:*:*:*:*:*:*",
              "matchCriteriaId": "03D1BFD1-E75E-4816-9D3B-380DACB50EFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2021:-:*:*:*:*:*:*",
              "matchCriteriaId": "C0BC96D8-AB88-47BF-B956-818BF9C8E91E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2021:r2:*:*:*:*:*:*",
              "matchCriteriaId": "CD0B65DD-E62E-4D7F-90C4-EE8EACE23F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2021:r3:*:*:*:*:*:*",
              "matchCriteriaId": "006E30B2-90DC-475D-835B-030A5801332F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "326C3FE1-6CE7-4FD4-9E8A-C14E1A0BE743",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2023:q2:*:*:*:*:*:*",
              "matchCriteriaId": "406FE5DA-02BE-4981-8F0E-C77840C5CB5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "2B89A08C-C66E-400A-A224-DF6ED111D565",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:veristand:2023:q4:*:*:*:*:*:*",
              "matchCriteriaId": "2A151AB1-BD09-4DF0-B7DD-4D8E1E7E026C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2018:r1:*:*:*:*:*:*",
              "matchCriteriaId": "9C2C31C3-9D4C-4FEE-8457-31E9F66CD043",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2018:r2:*:*:*:*:*:*",
              "matchCriteriaId": "F16894B6-5151-41DE-A1AC-7FB3C23DC05F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2018:r3:*:*:*:*:*:*",
              "matchCriteriaId": "4BE623D6-DE16-40ED-82CF-3CCD975B5C92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2018:r4:*:*:*:*:*:*",
              "matchCriteriaId": "0375EAF9-35F8-43AB-A26D-79B1C74E6055",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2019:r1:*:*:*:*:*:*",
              "matchCriteriaId": "1E8E8A79-BCBA-42D0-A4D5-4134327FDB07",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2019:r2:*:*:*:*:*:*",
              "matchCriteriaId": "91A2082B-47F5-4DFD-A9CE-115DB223B4A0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2019:r3:*:*:*:*:*:*",
              "matchCriteriaId": "758C8631-05F4-415B-861A-FF47896756BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2019:r4:*:*:*:*:*:*",
              "matchCriteriaId": "CA0E5A70-2CE4-485F-97BC-CEF8FC2C6C62",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2020:r1:*:*:*:*:*:*",
              "matchCriteriaId": "852AC7E1-DE18-4EAD-9079-7E3DF5EAD9A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2020:r2:*:*:*:*:*:*",
              "matchCriteriaId": "055A3E53-09AC-4CD4-8724-21E3F591550E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2020:r3:*:*:*:*:*:*",
              "matchCriteriaId": "BEE4C627-4298-469E-91BA-08C711F7EE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2020:r4:*:*:*:*:*:*",
              "matchCriteriaId": "A7BB6592-DBC5-4D4C-96AD-CDE24E1F576A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r1:*:*:*:*:*:*",
              "matchCriteriaId": "008505B6-6295-46CE-A923-27958172F026",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r2:*:*:*:*:*:*",
              "matchCriteriaId": "CE96AE31-D36F-446A-96A5-46C762818A96",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r3:*:*:*:*:*:*",
              "matchCriteriaId": "336F1E07-92EE-4BF5-AA14-981BFB67965C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2021:r4:*:*:*:*:*:*",
              "matchCriteriaId": "7D3A4BF7-5BF0-4EE5-BF7C-8C514D6238B5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2022:q2:*:*:*:*:*:*",
              "matchCriteriaId": "0213180D-04BD-4979-88BE-B21F385469CF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2022:q4:*:*:*:*:*:*",
              "matchCriteriaId": "A336AAE6-FA87-4900-AECD-12997D064A64",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q1:*:*:*:*:*:*",
              "matchCriteriaId": "CBFBD9F4-9FFF-44B2-8E95-2DEAC4476A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q2:*:*:*:*:*:*",
              "matchCriteriaId": "FA33AE39-F976-4C56-9A4B-8932BC6855C9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q3:*:*:*:*:*:*",
              "matchCriteriaId": "21C2A279-F66F-49D3-A4A8-1D56FEF22B6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q4:*:*:*:*:*:*",
              "matchCriteriaId": "08133BDF-895D-4D2A-8DAB-C02766DE86B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure.  An attacker could exploit this vulnerability by getting a user to open a specially crafted data file."
    },
    {
      "lang": "es",
      "value": "Una asignaci\u00f3n de permiso incorrecta en TopoGrafix DataPlugin para GPX podr\u00eda resultar en la divulgaci\u00f3n de informaci\u00f3n. Un atacante podr\u00eda aprovechar esta vulnerabilidad haciendo que un usuario abra un archivo de datos especialmente manipulado."
    }
  ],
  "id": "CVE-2023-5136",
  "lastModified": "2024-11-21T08:41:08.100",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-08T16:15:11.067",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-611"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-22 20:15
Modified
2024-11-21 09:49
Summary
An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service.
Impacted products
Vendor Product Version
ni flexlogger *
ni flexlogger 2023
ni systemlink *
ni systemlink 2024



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4CB33D-BB7C-4EBD-9E78-A9EDF952A7A6",
              "versionEndIncluding": "2023",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q2:*:*:*:*:*:*",
              "matchCriteriaId": "FA33AE39-F976-4C56-9A4B-8932BC6855C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:systemlink:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E2B822-C1E9-4ED5-A6D1-FF569A414330",
              "versionEndIncluding": "2024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:systemlink:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FA70DCDA-FE97-42A2-B45E-33154D29B840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service."
    },
    {
      "lang": "es",
      "value": " Una versi\u00f3n desactualizada de Redis enviada con NI SystemLink Server es susceptible a m\u00faltiples vulnerabilidades, incluida CVE-2022-24834. Esto afecta a NI SystemLink Server 2024 Q1 y versiones anteriores. Tambi\u00e9n afecta a NI FlexLogger 2023 Q2 y versiones anteriores que instalaron este servicio compartido."
    }
  ],
  "id": "CVE-2024-6121",
  "lastModified": "2024-11-21T09:49:00.370",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-22T20:15:04.267",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/ni-systemlink-server-ships-out-of-date-redis-version.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/ni-systemlink-server-ships-out-of-date-redis-version.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-07-22 20:15
Modified
2024-11-21 09:49
Summary
An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service.
Impacted products
Vendor Product Version
ni systemlink *
ni systemlink 2024
ni flexlogger *
ni flexlogger 2023



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:systemlink:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "61E2B822-C1E9-4ED5-A6D1-FF569A414330",
              "versionEndIncluding": "2024",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:systemlink:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "FA70DCDA-FE97-42A2-B45E-33154D29B840",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D4CB33D-BB7C-4EBD-9E78-A9EDF952A7A6",
              "versionEndIncluding": "2023",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2023:q2:*:*:*:*:*:*",
              "matchCriteriaId": "FA33AE39-F976-4C56-9A4B-8932BC6855C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service."
    },
    {
      "lang": "es",
      "value": " Un permiso incorrecto en el directorio de instalaci\u00f3n para el servicio compartido NI SystemLink Server KeyValueDatabase puede resultar en la divulgaci\u00f3n de informaci\u00f3n a trav\u00e9s del acceso local. Esto afecta a NI SystemLink Server 2024 Q1 y versiones anteriores. Tambi\u00e9n afecta a NI FlexLogger 2023 Q2 y versiones anteriores que instalaron este servicio compartido."
    }
  ],
  "id": "CVE-2024-6122",
  "lastModified": "2024-11-21T09:49:00.507",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "security@ni.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-07-22T20:15:04.470",
  "references": [
    {
      "source": "security@ni.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-default-directory-permissions-for-ni-systemlink-redis-service.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-default-directory-permissions-for-ni-systemlink-redis-service.html"
    }
  ],
  "sourceIdentifier": "security@ni.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "security@ni.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-276"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2025-03-18 14:15
Modified
2025-08-18 13:56
Summary
NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805.
Impacted products
Vendor Product Version
ni flexlogger 2024



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ni:flexlogger:2024:q1:*:*:*:*:*:*",
              "matchCriteriaId": "51A28944-C7A3-4750-908A-67FCF24B510B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de ejecuci\u00f3n remota de c\u00f3digo mediante an\u00e1lisis de archivos URI en NI FlexLogger usiReg. Esta vulnerabilidad permite a atacantes remotos crear archivos arbitrarios en las instalaciones afectadas de NI FlexLogger. Para explotar esta vulnerabilidad, se requiere la interacci\u00f3n del usuario, ya que el objetivo debe visitar una p\u00e1gina maliciosa o abrir un archivo malicioso. La falla espec\u00edfica se encuentra en el an\u00e1lisis de archivos URI por parte del componente usiReg. El problema se debe a la falta de validaci\u00f3n adecuada de una ruta proporcionada por el usuario antes de usarla en operaciones con archivos. Un atacante puede aprovechar esta vulnerabilidad para ejecutar c\u00f3digo en el contexto del usuario actual. Era ZDI-CAN-21805."
    }
  ],
  "id": "CVE-2025-2449",
  "lastModified": "2025-08-18T13:56:42.483",
  "metrics": {
    "cvssMetricV30": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.0"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "zdi-disclosures@trendmicro.com",
        "type": "Secondary"
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2025-03-18T14:15:45.670",
  "references": [
    {
      "source": "zdi-disclosures@trendmicro.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-146/"
    }
  ],
  "sourceIdentifier": "zdi-disclosures@trendmicro.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-22"
        }
      ],
      "source": "zdi-disclosures@trendmicro.com",
      "type": "Primary"
    }
  ]
}

CVE-2024-4044 (GCVE-0-2024-4044)
Vulnerability from cvelistv5
Published
2024-05-10 14:59
Modified
2024-08-01 20:26
CWE
  • CWE-502 - Deserialization of Untrusted Data
Summary
A deserialization of untrusted data vulnerability exists in common code used by FlexLogger and InstrumentStudio that may result in remote code execution. Successful exploitation requires an attacker to get a user to open a specially crafted project file. This vulnerability affects NI FlexLogger 2024 Q1 and prior versions as well as NI InstrumentStudio 2024 Q1 and prior versions.
References
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:ni:flexlogger:2024:q1:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "flexlogger",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "24.1",
                "status": "affected",
                "version": "2024",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ni:instrumentstudio:2024:q1:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "instrumentstudio",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "24.1",
                "status": "affected",
                "version": "2024",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-4044",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-05-11T17:25:10.120453Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T14:40:44.446Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T20:26:57.269Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://ni.com/r/CVE-2024-4044"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "24.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "InstrumentStudio",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "24.1",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "reporter",
          "user": "00000000-0000-4000-9000-000000000000",
          "value": "kimiya working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA deserialization of untrusted data vulnerability exists in common code used by FlexLogger and InstrumentStudio that may result in remote code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted project file.  This vulnerability affects NI FlexLogger 2024 Q1 and prior versions as well as NI InstrumentStudio 2024 Q1 and prior versions.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "A deserialization of untrusted data vulnerability exists in common code used by FlexLogger and InstrumentStudio that may result in remote code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted project file.  This vulnerability affects NI FlexLogger 2024 Q1 and prior versions as well as NI InstrumentStudio 2024 Q1 and prior versions.\n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-586",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-586 Object Injection"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-502",
              "description": "CWE-502 Deserialization of Untrusted Data",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-05-10T14:59:10.943Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://ni.com/r/CVE-2024-4044"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "title": "Deserialization of Untrusted Data Vulnerability in FlexLogger and InstrumentStudio",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2024-4044",
    "datePublished": "2024-05-10T14:59:10.943Z",
    "dateReserved": "2024-04-22T21:05:40.301Z",
    "dateUpdated": "2024-08-01T20:26:57.269Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6122 (GCVE-0-2024-6122)
Vulnerability from cvelistv5
Published
2024-07-22 19:27
Modified
2024-08-01 21:33
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service.
Impacted products
Vendor Product Version
NI SystemLink Server Version: 0    24.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:ni:systemlink:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "systemlink",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "2024q1",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ni:flexlogger:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unaffected",
            "product": "flexlogger",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "2023q2",
                "status": "affected",
                "version": "0",
                "versionType": "semver"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6122",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-23T14:14:23.092610Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-23T14:37:33.238Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:33:04.403Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-default-directory-permissions-for-ni-systemlink-redis-service.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "SystemLink Server",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "24.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "23.2",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An incorrect permission in the installation directory for the shared NI SystemLink Server KeyValueDatabase service may result in information disclosure via local access.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-1",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-1 Accessing Functionality Not Properly Constrained by ACLs"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-22T19:27:10.034Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-default-directory-permissions-for-ni-systemlink-redis-service.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Incorrect Default Directory Permissions for NI SystemLink Redis Service",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2024-6122",
    "datePublished": "2024-07-22T19:27:10.034Z",
    "dateReserved": "2024-06-18T11:42:00.421Z",
    "dateUpdated": "2024-08-01T21:33:04.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-5136 (GCVE-0-2023-5136)
Vulnerability from cvelistv5
Published
2023-11-08 15:24
Modified
2025-06-11 14:34
CWE
  • CWE-611 - Improper Restriction of XML External Entity Reference
Summary
An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure. An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T07:52:07.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-5136",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-04T14:20:44.035737Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-11T14:34:24.037Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "TopoGrafix DataPlugin for GPX",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "2023 Q4",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "DIAdem",
          "vendor": "NI",
          "versions": [
            {
              "lessThan": "2023 Q2",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "VeriStand",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2023 Q4",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2023 Q4",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure.  An attacker could exploit this vulnerability by getting a user to open a specially crafted data file.\u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An incorrect permission assignment in the TopoGrafix DataPlugin for GPX could result in information disclosure.  An attacker could exploit this vulnerability by getting a user to open a specially crafted data file."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-180",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-180 Exploiting Incorrectly Configured Access Control Security Levels"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-611",
              "description": "CWE-611 Improper Restriction of XML External Entity Reference",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-10-10T20:27:28.145Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/documentation/supplemental/23/incorrect-permission-assignment-in-the-topografix-dataplug-for-gpx.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Incorrect Permission Assignment in the TopoGrafix DataPlugin for GPX",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2023-5136",
    "datePublished": "2023-11-08T15:24:10.867Z",
    "dateReserved": "2023-09-22T19:29:47.084Z",
    "dateUpdated": "2025-06-11T14:34:24.037Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2025-2449 (GCVE-0-2025-2449)
Vulnerability from cvelistv5
Published
2025-03-18 13:18
Modified
2025-03-18 13:52
CWE
  • CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Summary
NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805.
References
Impacted products
Vendor Product Version
NI FlexLogger Version: 2024 Q1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-2449",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-03-18T13:51:40.419470Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T13:52:36.096Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unknown",
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "status": "affected",
              "version": "2024 Q1"
            }
          ]
        }
      ],
      "dateAssigned": "2025-03-17T16:49:41.312Z",
      "datePublic": "2025-03-17T20:34:22.262Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of NI FlexLogger. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of URI files by the usiReg component. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-21805."
        }
      ],
      "metrics": [
        {
          "cvssV3_0": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.0"
          },
          "format": "CVSS"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-22",
              "description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-03-18T13:18:32.984Z",
        "orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
        "shortName": "zdi"
      },
      "references": [
        {
          "name": "ZDI-25-146",
          "tags": [
            "x_research-advisory"
          ],
          "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-146/"
        }
      ],
      "source": {
        "lang": "en",
        "value": "06fe5fd2bc53027c4a3b7e395af0b850e7b8a044"
      },
      "title": "NI FlexLogger usiReg URI File Parsing Directory Traversal Remote Code Execution Vulnerability"
    }
  },
  "cveMetadata": {
    "assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
    "assignerShortName": "zdi",
    "cveId": "CVE-2025-2449",
    "datePublished": "2025-03-18T13:18:32.984Z",
    "dateReserved": "2025-03-17T16:49:41.233Z",
    "dateUpdated": "2025-03-18T13:52:36.096Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-6121 (GCVE-0-2024-6121)
Vulnerability from cvelistv5
Published
2024-07-22 19:46
Modified
2024-08-01 21:33
CWE
  • CWE-1395 - Dependency on Vulnerable Third-Party Component
Summary
An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834. This affects NI SystemLink Server 2024 Q1 and prior versions. It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service.
Impacted products
Vendor Product Version
NI SystemLink Server Version: 0    24.1
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-6121",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-07-29T16:55:03.521839Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-29T16:55:16.740Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T21:33:05.149Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/ni-systemlink-server-ships-out-of-date-redis-version.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "SystemLink Server",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "24.1",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "23.2",
              "status": "affected",
              "version": "0",
              "versionType": "semver"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "06fe5fd2bc53027c4a3b7e395af0b850e7b8a044 working with Trend Micro Zero Day Initiative"
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service. \u003c/span\u003e\u003cbr\u003e"
            }
          ],
          "value": "An out-of-date version of Redis shipped with NI SystemLink Server is susceptible to multiple vulnerabilities, including CVE-2022-24834.  This affects NI SystemLink Server 2024 Q1 and prior versions.  It also affects NI FlexLogger 2023 Q2 and prior versions which installed this shared service."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1395",
              "description": "CWE-1395 Dependency on Vulnerable Third-Party Component",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-07-22T19:46:11.685Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/ni-systemlink-server-ships-out-of-date-redis-version.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "NI SystemLink Server Ships Out of Date Redis Version",
      "x_generator": {
        "engine": "Vulnogram 0.2.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2024-6121",
    "datePublished": "2024-07-22T19:46:11.685Z",
    "dateReserved": "2024-06-18T11:41:52.912Z",
    "dateUpdated": "2024-08-01T21:33:05.149Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-27237 (GCVE-0-2022-27237)
Vulnerability from cvelistv5
Published
2022-04-21 04:32
Modified
2024-08-03 05:25
Severity ?
CWE
  • n/a
Summary
There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T05:25:32.493Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-04-21T04:32:44",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2022-27237",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "There is a cross-site scripting (XSS) vulnerability in an NI Web Server component installed with several NI products. Depending on the product(s) in use, remediation guidance includes: install SystemLink version 2021 R3 or later, install FlexLogger 2022 Q2 or later, install LabVIEW 2021 SP1, install G Web Development 2022 R1 or later, or install Static Test Software Suite version 1.2 or later."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html",
              "refsource": "CONFIRM",
              "url": "https://www.ni.com/en-us/support/documentation/supplemental/22/cross-site-scripting-vulnerability--in-ni-web-server-component.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-27237",
    "datePublished": "2022-04-21T04:32:44",
    "dateReserved": "2022-03-18T00:00:00",
    "dateUpdated": "2024-08-03T05:25:32.493Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1155 (GCVE-0-2024-1155)
Vulnerability from cvelistv5
Published
2024-02-20 14:34
Modified
2024-08-01 18:26
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1155",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T18:08:51.196119Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-05T17:20:58.903Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:26:30.614Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "SystemLink Server",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2023 Q3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2022 Q3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access. \u003cbr\u003e"
            }
          ],
          "value": "Incorrect permissions in the installation directories for shared SystemLink Elixir based services may allow an authenticated user to potentially enable escalation of privilege via local access. \n"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T14:34:08.556Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Incorrect permissions for shared NI SystemLink Elixir based services",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2024-1155",
    "datePublished": "2024-02-20T14:34:08.556Z",
    "dateReserved": "2024-02-01T14:25:54.006Z",
    "dateUpdated": "2024-08-01T18:26:30.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-1156 (GCVE-0-2024-1156)
Vulnerability from cvelistv5
Published
2024-02-20 14:37
Modified
2024-08-26 16:53
CWE
  • CWE-276 - Incorrect Default Permissions
Summary
Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T18:33:24.161Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:ni:flexlogger:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "flexlogger",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "2022_q3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:ni:systemlink:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "systemlink",
            "vendor": "ni",
            "versions": [
              {
                "lessThanOrEqual": "2023_q3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-1156",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-20T16:33:13.523683Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-26T16:53:40.189Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "SystemLink Server",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2023 Q3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows"
          ],
          "product": "FlexLogger",
          "vendor": "NI",
          "versions": [
            {
              "lessThanOrEqual": "2022 Q3",
              "status": "affected",
              "version": "0",
              "versionType": "custom"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges."
            }
          ],
          "value": "Incorrect directory permissions for the shared NI RabbitMQ service may allow a local authenticated user to read RabbitMQ configuration information and potentially enable escalation of privileges."
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-233",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-233 Privilege Escalation"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-276",
              "description": "CWE-276 Incorrect Default Permissions",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-20T14:37:07.095Z",
        "orgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
        "shortName": "NI"
      },
      "references": [
        {
          "url": "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/incorrect-permissions-for-shared-systemlink-elixir-based-service.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "bca5b2e8-03a4-4781-b4ca-c6a078c0bfd4",
    "assignerShortName": "NI",
    "cveId": "CVE-2024-1156",
    "datePublished": "2024-02-20T14:37:07.095Z",
    "dateReserved": "2024-02-01T14:26:04.700Z",
    "dateUpdated": "2024-08-26T16:53:40.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}