Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2018-25135 β€” AI Deep Analysis Summary

CVSS 9.8 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: CSV Injection via malicious formulas in imported fields. πŸ“‰ **Consequences**: Arbitrary command execution, data theft, or system compromise on the victim's machine.

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **CWE-149**: Improper Neutralization of Input During Web Page Generation. πŸ’₯ **Flaw**: The software fails to sanitize user-supplied data before parsing it as a CSV, allowing formula injection.

Q3Who is affected? (Versions/Components)

🏒 **Vendor**: Anviz Biometric Technology Co., Ltd. πŸ“¦ **Product**: Anviz AIM CrossChex Standard. πŸ“… **Affected Version**: Specifically **4.3.6.0**.

Q4What can hackers do? (Privileges/Data)

πŸ’» **Privileges**: Local System/User Level. πŸ“‚ **Data**: Full access to sensitive employee records, biometric data, and potential lateral movement within the network.

Q5Is exploitation threshold high? (Auth/Config)

πŸ”“ **Auth**: None required (PR:N). 🌐 **Access**: Network accessible (AV:N). 🎯 **UI**: No user interaction needed (UI:N). ⚑ **Threshold**: **LOW**. Easy to exploit.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ’£ **Public Exploit**: Yes. πŸ“š **References**: ExploitDB ID **45765** and Zero Science Lab Advisory **ZSL-2018-5498** are available.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Look for CSV import features in CrossChex Standard v4.3.6.0. πŸ“‘ **Scan**: Use scanners detecting CWE-149 or specific Anviz product fingerprints.

Q8Is it fixed officially? (Patch/Mitigation)

πŸ› οΈ **Fix**: Check the official Anviz homepage for updates. ⚠️ **Note**: The provided data does not explicitly list a patched version, so verify directly with the vendor.

Q9What if no patch? (Workaround)

🚧 **Workaround**: Disable CSV import functionality if possible. 🚫 **Mitigation**: Restrict access to the application and monitor for suspicious process executions (e.g., cmd.exe, powershell.exe).

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: **HIGH**. CVSS Score is **9.1** (Critical). πŸ“’ **Action**: Immediate patching or mitigation required due to high impact and low exploitation barrier.