LabVIEW

cancel
Showing results for 
Search instead for 
Did you mean: 

Recent Active X vulnerability

Recently there has been an announcement concerning patches to resolve Active X vulnerabilities for LabVIEW and deployed applications.  From the description (http://digital.ni.com/public.nsf/websearch/507DEC9DA57A708186257B3600512623?OpenDocument&espuid=CNAT...) it appears that this only applies to apps using Active X controls.

 

Is this a correct assessment?

 

0 Kudos
Message 1 of 12
(4,254 Views)

This announcement applies to all users regardless if they are using Active X controls in their application or not. We recommend that you install the update to ensure the security of your system.

Applications Engineer
National Instruments
0 Kudos
Message 2 of 12
(4,198 Views)

Hello:

 

How do I know if my Active-X is active or not?

 

thank you

 

\\diego2000

0 Kudos
Message 3 of 12
(4,193 Views)

Active X controls are not typically referred to as 'active' or 'inactive' but are a software component of Microsoft Windows used when interfacing with the internet. This site will give you more details about Active X controls and serve to provide more information on how they're used.

Blake C.
Applications Engineer
National Instruments
www.ni.com/support
0 Kudos
Message 4 of 12
(4,167 Views)

If this is an ActiveX vulnerability - Will it addressed by Microsoft in form of Security Patch or Hotfix?

0 Kudos
Message 5 of 12
(4,154 Views)

It's a vulnerability of some ActiveX components being installed by various NI products. Microsoft only has indirect influence on this, having developed the ActiveX technology. Even if your applications are not using any NI ActiveX component they are installed in your system anyhow and could be invoked through a carefully crafted web page when browsing the net, to allow exploiting its vulnerability. So you need to upgrade your system with the NI patch if you have any software from NI installed. This will make sure that any NI ActiveX component that is installed gets updated properly. NI will include this fix in all products that get released in the next big release cycle planned for August when NI week will start.

 

If you have disabled executation of ActiveX in your internet browser/internet zone, then the need to update your systems with the patch is less urgent but should still be done.

Rolf Kalbermatter  My Blog
DEMO, Electronic and Mechanical Support department, room 36.LB00.390
Message 6 of 12
(4,132 Views)

None of the related articles mention which version of LabVIEW are affected.  Does this vulnerability go way back, just 2012, or somewhere in between?  Thank you.

0 Kudos
Message 7 of 12
(4,071 Views)

@tourofmars wrote:

None of the related articles mention which version of LabVIEW are affected.  Does this vulnerability go way back, just 2012, or somewhere in between?  Thank you.


It affects ActiveX components installed with any NI Software prior to the release of the patch.  Bluntly- it goes way back


"Should be" isn't "Is" -Jay
0 Kudos
Message 8 of 12
(4,063 Views)

@tourofmars wrote:

None of the related articles mention which version of LabVIEW are affected.  Does this vulnerability go way back, just 2012, or somewhere in between?  Thank you.


Unless you are only using NI software before around 1995 you should certainly consider the patch. However if you use any software before 2005 you are likely to have much more serious trouble than this vulnerability.

Rolf Kalbermatter  My Blog
DEMO, Electronic and Mechanical Support department, room 36.LB00.390
0 Kudos
Message 9 of 12
(4,049 Views)

If I have not used NI ActiveX components in MSIE or Office products would I still need to roll out this NI security update?  Notably only a handful of NI ocx and dll files are affected.  The fewer unecessary changes I have to make to already validated systems the better.

 

http://digital.ni.com/public.nsf/allkb/357C0A5B43F3FCBE86257B360050CF9E

 

Peter
0 Kudos
Message 10 of 12
(3,990 Views)