CVE-2025-15351

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code by tricking users into opening malicious CHX files or visiting malicious pages. It affects Anritsu VectorStar installations due to improper deserialization of untrusted data during CHX file parsing. Attackers can exploit this to run code with the privileges of the current process.

💻 Affected Systems

Products:
  • Anritsu VectorStar
Versions: Specific versions not detailed in advisory; assume all versions before patched release.
Operating Systems: Windows-based systems running VectorStar
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability requires user interaction (opening malicious file or visiting malicious page).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to data theft, lateral movement, or persistent backdoor installation.

🟠

Likely Case

Local privilege escalation or malware execution on the affected VectorStar system.

🟢

If Mitigated

Limited impact if file execution is blocked or user interaction is prevented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to deliver malicious CHX file or link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched version.

Vendor Advisory: https://www.anritsu.com/en-us/support/security-advisories

Restart Required: Yes

Instructions:

1. Check Anritsu security advisory for patch details. 2. Download and apply the official patch from Anritsu. 3. Restart the VectorStar application or system as required.

🔧 Temporary Workarounds

Block CHX file execution

windows

Prevent execution of CHX files via application control or file restrictions.

Use Windows AppLocker or similar to block .chx files.

User awareness training

all

Educate users to avoid opening untrusted CHX files or clicking suspicious links.

🧯 If You Can't Patch

  • Isolate VectorStar systems from untrusted networks and internet access.
  • Implement strict file integrity monitoring and application whitelisting.

🔍 How to Verify

Check if Vulnerable:

Check VectorStar version against patched version in vendor advisory.

Check Version:

Check VectorStar 'About' menu or consult system documentation.

Verify Fix Applied:

Verify VectorStar version matches or exceeds patched version from advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution from VectorStar
  • CHX file access from untrusted sources

Network Indicators:

  • Outbound connections from VectorStar to unknown IPs post-file open

SIEM Query:

Process creation where parent process is VectorStar and command line includes .chx file from untrusted location.

🔗 References

📤 Share & Export