PT-2026-29331 · Anritsu · Remote Spectrum Monitor
Souvik Kandar
·
Published
2026-03-31
·
Updated
2026-03-31
·
CVE-2026-3356
CVSS v4.0
9.3
Critical
| AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X |
Name of the Vulnerable Software and Affected Versions
Anritsu Remote Spectrum Monitor (affected versions not specified)
Description
The Remote Spectrum Monitor is susceptible to an authentication bypass, enabling unauthorized access and manipulation of its management interface. The device lacks any authentication mechanism, making this a design flaw rather than a configuration issue. This allows for potential RF surveillance hijacking and signal manipulation.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Missing Authentication
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Remote Spectrum Monitor