CVE-2026-23812
- EPSS 0.02%
- Veröffentlicht 04.03.2026 16:13:48
- Zuletzt bearbeitet 09.03.2026 19:14:53
A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of...
CVE-2026-23811
- EPSS 0.02%
- Veröffentlicht 04.03.2026 16:12:32
- Zuletzt bearbeitet 09.03.2026 19:19:27
A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - whe...
CVE-2026-23810
- EPSS 0.02%
- Veröffentlicht 04.03.2026 16:11:35
- Zuletzt bearbeitet 09.03.2026 19:20:48
A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Tempo...
CVE-2026-23809
- EPSS 0.02%
- Veröffentlicht 04.03.2026 16:10:02
- Zuletzt bearbeitet 09.03.2026 19:22:51
A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSI...
CVE-2026-23808
- EPSS 0.04%
- Veröffentlicht 04.03.2026 16:09:17
- Zuletzt bearbeitet 09.03.2026 19:24:57
A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could all...
CVE-2026-23601
- EPSS 0%
- Veröffentlicht 04.03.2026 16:07:42
- Zuletzt bearbeitet 09.03.2026 19:25:46
A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Suc...
CVE-2025-37179
- EPSS 0.06%
- Veröffentlicht 13.01.2026 20:08:58
- Zuletzt bearbeitet 23.01.2026 15:21:57
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory ...
CVE-2025-37178
- EPSS 0.06%
- Veröffentlicht 13.01.2026 20:08:23
- Zuletzt bearbeitet 23.01.2026 16:06:12
Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory ...
CVE-2025-37177
- EPSS 0.09%
- Veröffentlicht 13.01.2026 20:08:06
- Zuletzt bearbeitet 23.01.2026 16:10:10
An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote mali...
CVE-2025-37176
- EPSS 0.07%
- Veröffentlicht 13.01.2026 20:07:50
- Zuletzt bearbeitet 23.01.2026 16:12:02
A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicio...