Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15348: CWE-502: Deserialization of Untrusted Data in Anritsu ShockLine

0
High
VulnerabilityCVE-2025-15348cvecve-2025-15348cwe-502
Published: Fri Jan 23 2026 (01/23/2026, 03:30:47 UTC)
Source: CVE Database V5
Vendor/Project: Anritsu
Product: ShockLine

Description

CVE-2025-15348 is a high-severity remote code execution vulnerability in Anritsu ShockLine version 2025. 4. 2. It arises from insecure deserialization of untrusted data during the parsing of CHX files. Exploitation requires user interaction, such as opening a malicious file or visiting a malicious page. Successful exploitation allows attackers to execute arbitrary code with the privileges of the current process, impacting confidentiality, integrity, and availability. No known exploits are currently in the wild. The vulnerability is particularly relevant for organizations using Anritsu ShockLine for network testing and diagnostics. European organizations relying on this product should prioritize patching and implement strict file handling policies. Countries with significant telecom infrastructure and industrial sectors using Anritsu products are at higher risk.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:08:37 UTC

Technical Analysis

CVE-2025-15348 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting Anritsu ShockLine version 2025.4.2. The flaw exists in the CHX file parsing component, where the software improperly validates user-supplied data before deserialization. This lack of validation allows an attacker to craft malicious CHX files that, when processed by the vulnerable ShockLine application, lead to arbitrary code execution within the context of the running process. The vulnerability requires user interaction, such as opening a malicious file or visiting a malicious webpage that triggers the parsing of the malicious CHX file. The CVSS 3.0 vector (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) indicates local attack vector with low attack complexity, no privileges required, but user interaction is necessary. The impact on confidentiality, integrity, and availability is high, as arbitrary code execution can lead to full system compromise. No patches or exploits are currently publicly available, but the vulnerability was reported and published by the Zero Day Initiative (ZDI) under ZDI-CAN-27833. Anritsu ShockLine is a network testing tool widely used in telecommunications and industrial sectors, making this vulnerability critical for environments relying on this product for network diagnostics and maintenance.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for telecom operators, industrial enterprises, and service providers using Anritsu ShockLine for network testing and diagnostics. Successful exploitation could lead to unauthorized access, data theft, disruption of network testing operations, and potential lateral movement within internal networks. This could affect the confidentiality of sensitive network data, integrity of test results, and availability of critical diagnostic tools. Given the role of ShockLine in maintaining network infrastructure, exploitation could indirectly impact broader network stability and service delivery. Organizations in sectors such as telecommunications, manufacturing, and critical infrastructure are particularly vulnerable. The requirement for user interaction limits remote exploitation but does not eliminate risk, especially in environments where files are frequently exchanged or downloaded from external sources.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should implement the following specific measures: 1) Immediately restrict the opening or processing of CHX files from untrusted or unknown sources to prevent accidental triggering of the vulnerability. 2) Implement strict file validation and scanning policies using advanced endpoint protection solutions capable of detecting malicious CHX files. 3) Educate users about the risks of opening files from untrusted sources and enforce policies to minimize user interaction with potentially malicious content. 4) Monitor network and endpoint logs for unusual activity related to ShockLine usage or unexpected process executions. 5) Coordinate with Anritsu for timely updates or patches; if no patch is available, consider isolating ShockLine systems from general user environments and limit their network access. 6) Employ application whitelisting to prevent unauthorized code execution within ShockLine’s operational context. 7) Regularly review and update incident response plans to include scenarios involving exploitation of this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-30T01:34:44.833Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972f3a54623b1157cfeb6e4

Added to database: 1/23/2026, 4:05:57 AM

Last enriched: 1/30/2026, 10:08:37 AM

Last updated: 2/5/2026, 4:04:20 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats