4.3

CVE-2026-23810

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 <= 8.10.0.21
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.11.0.0 <= 8.12.0.6
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.13.0.0 <= 8.13.1.1
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.3.0.0 <= 10.4.1.10
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.5.0.0 <= 10.7.2.2
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version10.8.0.0
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.058
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 3.1 1.6 1.4
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
security-alert@hpe.com 4.3 2.8 1.4
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-300 Channel Accessible by Non-Endpoint

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.