CVE-2025-7975
📋 TL;DR
This vulnerability allows remote attackers to execute arbitrary code on Anritsu ShockLine systems by tricking users into opening malicious CHX files. The flaw exists in improper path validation during CHX file parsing, enabling directory traversal and code execution. Affected users include anyone running vulnerable Anritsu ShockLine installations.
💻 Affected Systems
- Anritsu ShockLine
📦 What is this software?
Shockline by Anritsu
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise with attacker gaining full control of the affected system, data theft, lateral movement within the network, and persistent backdoor installation.
Likely Case
Local user privilege escalation leading to unauthorized access to sensitive measurement data, system configuration manipulation, and potential disruption of testing operations.
If Mitigated
Limited impact with only temporary service disruption if proper network segmentation and user privilege restrictions are in place.
🎯 Exploit Status
Exploitation requires user interaction but is technically straightforward once malicious file is opened. Weaponization likely due to RCE potential and directory traversal primitive.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not specified in available references
Vendor Advisory: https://www.zerodayinitiative.com/advisories/ZDI-25-647/
Restart Required: Yes
Instructions:
1. Contact Anritsu support for patch information. 2. Apply vendor-provided security update. 3. Restart ShockLine application/services. 4. Verify patch installation.
🔧 Temporary Workarounds
Restrict CHX file handling
windowsConfigure system to open CHX files only from trusted sources and implement file type validation
User awareness training
allTrain users to only open CHX files from trusted sources and verify file integrity
🧯 If You Can't Patch
- Network segmentation: Isolate ShockLine systems from critical networks
- Implement application whitelisting to prevent unauthorized code execution
🔍 How to Verify
Check if Vulnerable:
Check ShockLine version against vendor advisory. Monitor for unexpected CHX file processing or directory traversal attempts.
Check Version:
Check ShockLine application 'About' dialog or consult vendor documentation
Verify Fix Applied:
Verify installed version matches patched version from vendor advisory. Test with safe CHX files to ensure proper parsing.
📡 Detection & Monitoring
Log Indicators:
- Unusual CHX file processing events
- Directory traversal attempts in file operations
- Unexpected process execution following CHX file opening
Network Indicators:
- Outbound connections from ShockLine systems to unknown destinations
- Unusual file transfers from measurement systems
SIEM Query:
Process creation events where parent process is ShockLine executable followed by suspicious child processes