Cyber Posture

CVE-2024-12742

High

Published: 06 March 2025

Published
06 March 2025
Modified
15 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0051 66.3th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Description

An adversary may rely upon a user opening a malicious file in order to gain execution.

Security Summary

CVE-2024-12742 is a deserialization of untrusted data vulnerability (CWE-502) in NI G Web Development Software that can lead to arbitrary code execution. The issue affects G Web Development Software 2022 Q3 and prior versions. It has a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) and was published on 2025-03-06.

Exploitation requires an attacker to trick a user into opening a specially crafted project file, as the attack vector is local with low complexity and no privileges required, though user interaction is necessary. Successful exploitation allows arbitrary code execution on the affected system, resulting in high impacts to confidentiality, integrity, and availability.

The official NI security advisory provides details on available critical and security updates for mitigation: https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/deserialization-of-untrusted-data-vulnerability-in-ni-g-web-deve.html.

Details

CWE(s)
CWE-502

MITRE ATT&CK Enterprise Techniques

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

The deserialization vulnerability enables arbitrary code execution when a user opens a malicious project file, directly facilitating T1203 (Exploitation for Client Execution) and T1204.002 (User Execution: Malicious File).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References