CVE-2025-15350

7.8 HIGH

📋 TL;DR

A deserialization vulnerability in Anritsu VectorStar's CHX file parser allows remote attackers to execute arbitrary code when a user opens a malicious CHX file or visits a malicious webpage. This affects all installations of Anritsu VectorStar that process CHX files. Attackers can gain code execution in the context of the current user process.

💻 Affected Systems

Products:
  • Anritsu VectorStar
Versions: All versions prior to patch
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction to open malicious CHX files or visit malicious webpages that trigger file parsing.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining the same privileges as the user running VectorStar, potentially leading to lateral movement, data theft, or ransomware deployment.

🟠

Likely Case

Local privilege escalation or malware execution on the affected system, potentially compromising sensitive measurement data and network-connected equipment.

🟢

If Mitigated

Limited impact with proper application sandboxing and user privilege restrictions, though data integrity may still be compromised.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires user interaction but uses common deserialization techniques. ZDI-CAN-27039 tracking suggests active research.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Anritsu security advisory for specific patched version

Vendor Advisory: https://www.anritsu.com/en-us/support/security-advisories

Restart Required: Yes

Instructions:

1. Check Anritsu security advisory for patch availability
2. Download and install the latest VectorStar update
3. Restart the application and system
4. Verify patch installation

🔧 Temporary Workarounds

Restrict CHX file handling

windows

Block or restrict processing of CHX files through application controls or file association changes

Application sandboxing

windows

Run VectorStar with reduced privileges using application control solutions

🧯 If You Can't Patch

  • Implement strict network segmentation for VectorStar systems
  • Use application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check VectorStar version against patched version in Anritsu advisory

Check Version:

Check VectorStar 'About' dialog or installation directory version information

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process creation from VectorStar
  • CHX file parsing errors or crashes
  • Unusual network connections from VectorStar process

Network Indicators:

  • Outbound connections from VectorStar to unexpected destinations
  • DNS requests for suspicious domains from VectorStar host

SIEM Query:

Process Creation where Parent Process contains 'VectorStar' AND Command Line contains suspicious patterns

🔗 References

📤 Share & Export