4.3

CVE-2026-23812

Security Boundary Bypass via Routing Node Impersonation

A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 <= 8.10.0.21
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.11.0.0 <= 8.12.0.6
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 8.13.0.0 <= 8.13.1.1
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.3.0.0 <= 10.4.1.10
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version >= 10.5.0.0 <= 10.7.2.2
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
ArubanetworksArubaos Version10.8.0.0
   Arubanetworks7010 Version-
   Arubanetworks7030 Version-
   Arubanetworks7205 Version-
   Arubanetworks7210 Version-
   Arubanetworks7220 Version-
   Arubanetworks7240xm Version-
   Arubanetworks7280 Version-
   Arubanetworks9004 Version-
   Arubanetworks9004-lte Version-
   Arubanetworks9012 Version-
   Arubanetworks9106 Version-
   Arubanetworks9114 Version-
   Arubanetworks9240 Version-
   ArubanetworksAp-634 Version-
   ArubanetworksAp-635 Version-
   ArubanetworksAp-654 Version-
   ArubanetworksAp-655 Version-
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.066
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.2 1.6 2.5
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
security-alert@hpe.com 4.3 2.8 1.4
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CWE-300 Channel Accessible by Non-Endpoint

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.