Airspan Networks Mimosa
Airspan Networks Mimosa devices and management platform contain multiple critical vulnerabilities (CWE-285 authorization bypass, CWE-863 improper access control, CWE-918 unsanitized HTTP request, CWE-89 SQL injection, CWE-502 deserialization of untrusted data, CWE-78 OS command injection, CWE-327 weak cryptography) that allow unauthenticated remote attackers to execute arbitrary code on devices and compromise connected AWS infrastructure. Successful exploitation could result in unauthorized access to customer data, organization details, and compromise of EC2 instances and S3 buckets containing sensitive information.
- Network access to the Mimosa device management interface (typically port 80/443)
- Device must be cloud-connected to AWS
- No authentication required for initial exploit
Patching may require device reboot — plan for process interruption
/api/v1/advisories/f7e61fa8-4d78-447a-8409-a8393d999f5fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.