CVE-2025-15348

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Anritsu ShockLine systems by tricking users into opening malicious CHX files. Attackers can gain control of affected systems through deserialization flaws in CHX file parsing. Organizations using Anritsu ShockLine products are affected.

💻 Affected Systems

Products:
  • Anritsu ShockLine
Versions: Specific versions not detailed in advisory - all versions before vendor patch
Operating Systems: Windows-based systems running ShockLine software
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in CHX file parsing component; requires user to open malicious file

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the ShockLine device, potentially pivoting to other network systems.

🟠

Likely Case

Local privilege escalation or limited code execution within the ShockLine application context, potentially disrupting testing operations.

🟢

If Mitigated

No impact if proper file validation and user awareness controls prevent malicious CHX files from being processed.

🌐 Internet-Facing: MEDIUM - Requires user interaction but could be delivered via web or email to internet-facing users.
🏢 Internal Only: HIGH - Internal users could be targeted via phishing or shared malicious files on internal networks.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires user interaction but exploit complexity is low once malicious file is opened

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor advisory

Vendor Advisory: Not provided in references

Restart Required: Yes

Instructions:

1. Contact Anritsu for patch availability 2. Apply vendor-provided update 3. Restart affected systems

🔧 Temporary Workarounds

Restrict CHX file handling

all

Block or restrict processing of CHX files from untrusted sources

User awareness training

all

Train users not to open CHX files from unknown or untrusted sources

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized code execution
  • Use network segmentation to isolate ShockLine systems from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check ShockLine version against vendor advisory when available

Check Version:

Check within ShockLine application interface or contact vendor

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from ShockLine
  • CHX file parsing errors
  • Unusual network connections from ShockLine system

Network Indicators:

  • Outbound connections from ShockLine to unexpected destinations
  • File transfers to/from ShockLine system

SIEM Query:

Process creation where parent process contains 'ShockLine' AND command line contains suspicious patterns

🔗 References

📤 Share & Export