A researcher has discovered several critical vulnerabilities in wireless broadband products made by Mimosa Networks. The flaws can expose affected devices to remote attacks.
Mimosa, a division of Airspan, provides wireless broadband solutions that can be used to connect dense urban homes, as well as hard-to-reach rural homes.
According to an advisory published last week by the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Mimosa’s management platform (MMP), as well as its point-to-point (PTP) and point-to-multipoint (PTMP) products are affected by seven types of vulnerabilities.
Four of the security holes have been assigned a severity rating of “critical,” including issues that can be exploited for remote code execution, obtaining sensitive information, and causing a denial-of-service (DoS) condition. Two of the remaining flaws, which can be exploited for arbitrary code execution and obtaining sensitive information, have been rated “high severity.”
Mimosa has released updates that should patch these vulnerabilities.
SecurityWeek has reached out to Noam Moshe, vulnerability researcher at industrial and IoT security firm Claroty, who has been credited for finding the flaws.
Moshe says the vulnerabilities can be exploited remotely from the internet — the attacker only needs to be able to access the cloud-based management web interface. The security holes expose all cloud-connected devices to attacks.
“Before the vulnerabilities were patched, to exploit these vulnerabilities an attacker would have needed to send specially crafted requests to the cloud servers in order to gain full access,” the researcher explained.
He added, “By exploiting these vulnerabilities, a remote attacker could exfiltrate sensitive data from all cloud-connected devices, including the device’s real-life locations, shared secrets and internal data of the company that owns the device. Furthermore, attackers could even achieve remote code execution on field internet-supplying devices, gaining full control of the devices and full access to any information being kept on them.”
According to CISA, the vulnerabilities have been patched by Mimosa with the release of version 1.0.4 of MMP and version 2.90 for the impacted PTP and PTMP products.
Related: FragAttacks: New Vulnerabilities Expose All Devices With Wi-Fi to Attacks
Related: Vulnerabilities in Realtek Wi-Fi Module Expose Many Devices to Remote Attacks

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- OpenSSL 1.1.1 Nears End of Life: Security Updates Only Until September 2023
- Google Links More iOS, Android Zero-Day Exploits to Spyware Vendors
- ChatGPT Data Breach Confirmed as Security Firm Warns of Vulnerable Component Exploitation
- Thousands Access Fake DDoS-for-Hire Websites Set Up by UK Police
Latest News
- Italy Temporarily Blocks ChatGPT Over Privacy Concerns
- FDA Announces New Cybersecurity Requirements for Medical Devices
- Report: Chinese State-Sponsored Hacking Group Highly Active
- Votiro Raises $11.5 Million to Prevent File-Borne Threats
- Lumen Technologies Hit by Two Cyberattacks
- Leaked Documents Detail Russia’s Cyberwarfare Tools, Including for OT Attacks
- Mandiant Investigating 3CX Hack as Evidence Shows Attackers Had Access for Months
- Severe Azure Vulnerability Led to Unauthenticated Remote Code Execution
