7.6

CVE-2026-23809

A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the victim's network traffic, potentially resulting in eavesdropping, session hijacking, or denial of service.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 <= 8.10.0.21
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.11.0.0 <= 8.12.0.6
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.13.0.0 <= 8.13.1.1
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.3.0.0 <= 10.4.1.10
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.5.0.0 <= 10.7.2.2
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version10.8.0.0
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.029
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.6 2.8 4.7
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
security-alert@hpe.com 5.4 2.8 2.5
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
CWE-400 Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.