4.3

CVE-2026-23810

Cross-BSSID GTK Re-encryption and Traffic Injection

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 <= 8.10.0.21
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.11.0.0 <= 8.12.0.6
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.13.0.0 <= 8.13.1.1
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.3.0.0 <= 10.4.1.10
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.5.0.0 <= 10.7.2.2
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version10.8.0.0
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.04% 0.104
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 3.1 1.6 1.4
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
security-alert@hpe.com 4.3 2.8 1.4
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-300 Channel Accessible by Non-Endpoint

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.