Vision related software from NI used a third-party library for image processing that exposes several vulnerabilities. These vulnerabilities may result in arbitrary code execution. Successful exploitation requires an attacker to get a user to open a specially crafted file.
Exploitability
AV:LAC:LAT:NPR:LUI:PVulnerable System
VC:HVI:HVA:HSubsequent System
SC:NSI:NSA:N7/CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/AU:NOther