Description
The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass that allows unauthorized users to access and manipulate its management interface. Because the device provides no mechanism to enable or configure authentication, the issue is inherent to its design rather than a deployment error.
Published: 2026-03-31
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Isolate Device
AI Analysis

Impact

The MS27102A Remote Spectrum Monitor is afflicted by an authentication bypass that permits any network user to gain full control of the device’s management interface. The vendors lack any mechanism to enforce authentication or to make it configurable, making the flaw inherent to the device’s design. Consequently an attacker can modify settings, view sensitive data, and potentially disrupt normal operation, resulting in loss of confidentiality, integrity, and availability. This weakness aligns with CWE-306, missing authentication for a critical function.

Affected Systems

Affected vendors and products are Anritsu Remote Spectrum Monitor models MS27100A, MS27101A, MS27102A, and MS27103A. Specific version numbers are not disclosed, but all devices of these series share the same design flaw. The vulnerability applies to each of these monitors wherever they are connected to a network.

Risk and Exploitability

With a CVSS score of 9.3, this vulnerability is rated critical. The EPSS score is unavailable, and the flaw is not listed in the CISA KEV catalog, but the lack of authentication makes exploitation straightforward over the network. The likely attack vector is remote access via the device’s open management interface, which can be reached from within a local network or over any otherwise trusted connection. Because no patch is offered, the recommendation is to restrict connectivity to the device and place it in a hardened environment.

Generated by OpenCVE AI on March 31, 2026 at 20:20 UTC.

Remediation

Vendor Workaround

Anritsu has no plans to fix this issue. Anritsu recommends that users deploy Remote Spectrum Monitor within secure network environments to mitigate potential risks. Users can contact Anritsu Technical Support (1-800-267-4878) for more information.


OpenCVE Recommended Actions

  • Deploy the Remote Spectrum Monitor within a secure, isolated network segment to limit exposure.
  • Restrict inbound management traffic to trusted IP addresses or use VPN tunnels.
  • Contact Anritsu Technical Support for guidance and verify that no firmware updates address the issue.

Generated by OpenCVE AI on March 31, 2026 at 20:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 02:15:00 +0000

Type Values Removed Values Added
First Time appeared Anritsu
Anritsu remote Spectrum Monitor Ms27100a
Anritsu remote Spectrum Monitor Ms27101a
Anritsu remote Spectrum Monitor Ms27102a
Anritsu remote Spectrum Monitor Ms27103a
Vendors & Products Anritsu
Anritsu remote Spectrum Monitor Ms27100a
Anritsu remote Spectrum Monitor Ms27101a
Anritsu remote Spectrum Monitor Ms27102a
Anritsu remote Spectrum Monitor Ms27103a

Tue, 31 Mar 2026 19:00:00 +0000

Type Values Removed Values Added
Description The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass that allows unauthorized users to access and manipulate its management interface. Because the device provides no mechanism to enable or configure authentication, the issue is inherent to its design rather than a deployment error.
Title Missing Authentication for Critical Function vulnerability in Anritsu Remote Spectrum Monitor
Weaknesses CWE-306
References
Metrics cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Anritsu Remote Spectrum Monitor Ms27100a Remote Spectrum Monitor Ms27101a Remote Spectrum Monitor Ms27102a Remote Spectrum Monitor Ms27103a
cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2026-04-01T13:43:44.724Z

Reserved: 2026-02-27T18:08:31.007Z

Link: CVE-2026-3356

cve-icon Vulnrichment

Updated: 2026-04-01T13:43:41.554Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-31T19:16:28.943

Modified: 2026-04-01T14:23:37.727

Link: CVE-2026-3356

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-02T07:53:13Z

Weaknesses