PT-2026-29331 · Anritsu · Remote Spectrum Monitor

Souvik Kandar

·

Published

2026-03-31

·

Updated

2026-03-31

·

CVE-2026-3356

CVSS v4.0

9.3

Critical

AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Name of the Vulnerable Software and Affected Versions Anritsu Remote Spectrum Monitor (affected versions not specified)
Description The Remote Spectrum Monitor is susceptible to an authentication bypass, enabling unauthorized access and manipulation of its management interface. The device lacks any authentication mechanism, making this a design flaw rather than a configuration issue. This allows for potential RF surveillance hijacking and signal manipulation.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Missing Authentication

Weakness Enumeration

Related Identifiers

CVE-2026-3356

Affected Products

Remote Spectrum Monitor