A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution. Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file. The NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.  Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.
History

Fri, 02 May 2025 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Ni
Ni system Configuration
CPEs cpe:2.3:a:ni:system_configuration:*:*:*:*:*:*:*:*
Vendors & Products Ni
Ni system Configuration
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: NI

Published: 2024-07-23T13:15:50.508Z

Updated: 2025-05-01T03:55:27.855Z

Reserved: 2024-06-03T18:30:25.158Z

Link: CVE-2024-5602

cve-icon Vulnrichment

Updated: 2024-08-01T21:18:06.360Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-23T14:15:15.077

Modified: 2024-11-21T09:48:00.070

Link: CVE-2024-5602

cve-icon Redhat

No data.