CVE-2025-7975

7.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on Anritsu ShockLine systems by tricking users into opening malicious CHX files. The flaw exists in improper path validation during CHX file parsing, enabling directory traversal and code execution. Affected users include anyone running vulnerable Anritsu ShockLine installations.

💻 Affected Systems

Products:
  • Anritsu ShockLine
Versions: Specific versions not publicly disclosed in available references
Operating Systems: Windows (assumed based on typical ShockLine deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: User interaction required - victim must open malicious CHX file or visit malicious page. Typically affects test and measurement systems in lab environments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control of the affected system, data theft, lateral movement within the network, and persistent backdoor installation.

🟠

Likely Case

Local user privilege escalation leading to unauthorized access to sensitive measurement data, system configuration manipulation, and potential disruption of testing operations.

🟢

If Mitigated

Limited impact with only temporary service disruption if proper network segmentation and user privilege restrictions are in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires user interaction but is technically straightforward once malicious file is opened. Weaponization likely due to RCE potential and directory traversal primitive.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in available references

Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-647/

Restart Required: Yes

Instructions:

1. Contact Anritsu support for patch information. 2. Apply vendor-provided security update. 3. Restart ShockLine application/services. 4. Verify patch installation.

🔧 Temporary Workarounds

Restrict CHX file handling

windows

Configure system to open CHX files only from trusted sources and implement file type validation

User awareness training

all

Train users to only open CHX files from trusted sources and verify file integrity

🧯 If You Can't Patch

  • Network segmentation: Isolate ShockLine systems from critical networks
  • Implement application whitelisting to prevent unauthorized code execution

🔍 How to Verify

Check if Vulnerable:

Check ShockLine version against vendor advisory. Monitor for unexpected CHX file processing or directory traversal attempts.

Check Version:

Check ShockLine application 'About' dialog or consult vendor documentation

Verify Fix Applied:

Verify installed version matches patched version from vendor advisory. Test with safe CHX files to ensure proper parsing.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CHX file processing events
  • Directory traversal attempts in file operations
  • Unexpected process execution following CHX file opening

Network Indicators:

  • Outbound connections from ShockLine systems to unknown destinations
  • Unusual file transfers from measurement systems

SIEM Query:

Process creation events where parent process is ShockLine executable followed by suspicious child processes

🔗 References

📤 Share & Export