5.4

CVE-2026-23601

A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Successful exploitation allows for the delivery of tampered data to specific endpoints, bypassing standard cryptographic separation.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 <= 8.10.0.21
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.11.0.0 <= 8.12.0.6
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.13.0.0 <= 8.13.1.1
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.3.0.0 <= 10.4.1.10
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.5.0.0 <= 10.7.2.2
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version10.8.0.0
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0% 0.001
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
security-alert@hpe.com 5.4 2.8 2.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-327 Use of a Broken or Risky Cryptographic Algorithm

The product uses a broken or risky cryptographic algorithm or protocol.