A stack-based buffer overflow vulnerability due to a missing bounds check in the NI I/O Trace Tool may result in arbitrary code execution.  Successful exploitation requires an attacker to provide a user with a specially crafted nitrace file.
The NI I/O Trace tool is installed as part of the NI System Configuration utilities included with many NI software products.  Refer to the NI Security Advisory for identifying the version of NI IO Trace.exe installed. The NI I/O Trace tool was also previously released as NI Spy.
                
            Metrics
Affected Vendors & Products
References
        History
                    Fri, 02 May 2025 08:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Ni Ni system Configuration | |
| CPEs | cpe:2.3:a:ni:system_configuration:*:*:*:*:*:*:*:* | |
| Vendors & Products | Ni Ni system Configuration | |
| Metrics | ssvc 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: NI
Published: 2024-07-23T13:15:50.508Z
Updated: 2025-08-27T20:42:59.211Z
Reserved: 2024-06-03T18:30:25.158Z
Link: CVE-2024-5602
 Vulnrichment
                        Vulnrichment
                    Updated: 2024-08-01T21:18:06.360Z
 NVD
                        NVD
                    Status : Awaiting Analysis
Published: 2024-07-23T14:15:15.077
Modified: 2024-11-21T09:48:00.070
Link: CVE-2024-5602
 Redhat
                        Redhat
                    No data.