CVE Vulnerabilities

CVE-2026-23810

Channel Accessible by Non-Endpoint

Published: Mar 04, 2026 | Modified: Mar 09, 2026
CVSS 3.x
3.1
LOW
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victims BSSID. Successful exploitation may enable GTK-independent traffic injection and, when combined with a port-stealing technique, allows an attacker to redirect intercepted traffic to facilitate machine-in-the-middle (MitM) attacks across BSSID boundaries.

Weakness

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Affected Software

NameVendorStart VersionEnd Version
ArubaosArubanetworks6.5.4.0 (including)8.10.0.21 (including)
ArubaosArubanetworks8.11.0.0 (including)8.12.0.6 (including)
ArubaosArubanetworks8.13.0.0 (including)8.13.1.1 (including)
ArubaosArubanetworks10.3.0.0 (including)10.4.1.10 (including)
ArubaosArubanetworks10.5.0.0 (including)10.7.2.2 (including)
ArubaosArubanetworks10.8.0.0 (including)10.8.0.0 (including)

Potential Mitigations

References