Critical Authentication Bypass in Anritsu Remote Spectrum Monitors Left Unpatched
Take action: Since Anritsu will not patch this critical flaw, these devices are permanently insecure. Make sure to isolate them from the internet and all untrusted networks. Ideally, consider replacing them with hardware that supports modern authentication standards because no isolation is perfect.
Learn More
CISA is reporting a critical security vulnerability affecting Anritsu Remote Spectrum Monitor series.
The flaw is tracked as CVE-2026-3356 (CVSS score 9.8), missing authentication vulnerability in the management interface of Anritsu Remote Spectrum Monitor devices that allows unauthenticated remote attackers to gain full control. The flaw is caused by a design choice where no mechanism exists to enable or configure authentication for critical functions.
Successful exploitation allows attackers to alter operational settings and intercept sensitive signal data transmitted or monitored by the hardware.
Since the device lacks any authentication mechanism by design, any actor with network visibility to the monitor can execute administrative commands without needing credentials or specialized exploit code.
The vulnerability impacts all versions of the following Anritsu products:
- Remote Spectrum Monitor MS27100A
- Remote Spectrum Monitor MS27101A
- Remote Spectrum Monitor MS27102A
- Remote Spectrum Monitor MS27103A
Anritsu has stated they have no plans to release firmware updates or patches to resolve this vulnerability, effectively leaving the hardware permanently exposed. The manufacturer and CISA recommend strict network isolation, placing affected devices behind robust firewalls and ensuring they are never reachable from the public internet. Organizations must use secure VPNs for any required remote access.