Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15350: CWE-502: Deserialization of Untrusted Data in Anritsu VectorStar

0
High
VulnerabilityCVE-2025-15350cvecve-2025-15350cwe-502
Published: Fri Jan 23 2026 (01/23/2026, 03:31:26 UTC)
Source: CVE Database V5
Vendor/Project: Anritsu
Product: VectorStar

Description

CVE-2025-15350 is a high-severity remote code execution vulnerability in Anritsu VectorStar version 2024. 11. 1. It arises from improper validation during the parsing of CHX files, leading to deserialization of untrusted data. Exploitation requires user interaction, such as opening a malicious file or visiting a crafted webpage. Successful exploitation allows attackers to execute arbitrary code with the privileges of the current process, impacting confidentiality, integrity, and availability. No known exploits are currently in the wild. The vulnerability is rated with a CVSS score of 7. 8, reflecting its significant risk. European organizations using Anritsu VectorStar, particularly in telecommunications and electronics testing sectors, should prioritize patching and implement strict file handling policies.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:10:47 UTC

Technical Analysis

CVE-2025-15350 is a deserialization vulnerability classified under CWE-502 affecting Anritsu VectorStar version 2024.11.1. The flaw exists in the CHX file parser, where user-supplied data is not properly validated before deserialization. This improper validation allows an attacker to craft malicious CHX files that, when opened by the VectorStar application, trigger deserialization of untrusted data. Deserialization vulnerabilities are critical because they can lead to arbitrary code execution within the context of the vulnerable application. In this case, remote attackers can exploit the vulnerability by convincing a user to open a malicious CHX file or visit a malicious webpage that delivers such a file. The attack requires user interaction but does not require prior authentication or elevated privileges. The CVSS 3.0 score of 7.8 indicates high severity, with attack vector local (AV:L), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no exploits are currently known in the wild, the vulnerability poses a significant risk to environments where VectorStar is used, particularly in telecommunications and electronics testing domains. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation strategies.

Potential Impact

The vulnerability allows remote code execution, which can lead to complete compromise of affected systems running Anritsu VectorStar. For European organizations, this could result in unauthorized access to sensitive test data, manipulation or destruction of measurement results, and disruption of critical telecommunications testing operations. Given the role of VectorStar in high-precision electronic and telecommunications testing, exploitation could undermine product quality assurance, delay development cycles, and damage organizational reputation. Additionally, attackers could use compromised systems as footholds for lateral movement within networks, potentially targeting critical infrastructure or intellectual property. The requirement for user interaction limits mass exploitation but targeted attacks against key personnel or departments remain a significant threat. The high confidentiality, integrity, and availability impacts make this vulnerability particularly concerning for sectors reliant on accurate and secure testing environments.

Mitigation Recommendations

1. Restrict the sources of CHX files to trusted and verified origins only, implementing strict file transfer and sharing policies. 2. Employ application whitelisting to prevent execution of unauthorized or suspicious files within the VectorStar environment. 3. Educate users on the risks of opening unsolicited or unexpected CHX files and visiting untrusted websites. 4. Monitor network and endpoint logs for unusual activity related to VectorStar, such as unexpected file openings or process behaviors. 5. Isolate VectorStar installations in segmented network zones to limit potential lateral movement if compromised. 6. Regularly back up critical data and configurations to enable recovery in case of compromise. 7. Engage with Anritsu for timely updates or patches and apply them as soon as they become available. 8. Consider deploying endpoint detection and response (EDR) solutions capable of detecting deserialization attack patterns or anomalous code execution within VectorStar processes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2025-12-30T01:35:19.769Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972f3a54623b1157cfeb6ea

Added to database: 1/23/2026, 4:05:57 AM

Last enriched: 1/30/2026, 10:10:47 AM

Last updated: 2/3/2026, 3:12:37 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats