{"uuid": "ad55c18b-280b-4e2a-abbb-116a90fb96ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-30417", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/16525", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-30417\n\ud83d\udd25 CVSS Score: 7.8 (cvssV3_1, Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: There is a memory corruption vulnerability in\u00a0due to an out of bounds write in\u00a0Library!DecodeBase64() when using the SymbolEditor in NI Circuit Design Suite. \u00a0This vulnerability may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted .sym file. This vulnerability\u00a0affects NI Circuit Design Suite 14.3.0 and prior versions.\n\ud83d\udccf Published: 2025-05-15T16:18:53.901Z\n\ud83d\udccf Modified: 2025-05-15T16:18:53.901Z\n\ud83d\udd17 References:\n1. https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-circuit-design-suite.html", "creation_timestamp": "2025-05-15T16:35:19.000000Z"}