CVE Vulnerabilities

CVE-2026-23811

Channel Accessible by Non-Endpoint

Published: Mar 04, 2026 | Modified: Mar 09, 2026
CVSS 3.x
3.1
LOW
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) attack.

Weakness

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Affected Software

NameVendorStart VersionEnd Version
ArubaosArubanetworks6.5.4.0 (including)8.10.0.21 (including)
ArubaosArubanetworks8.11.0.0 (including)8.12.0.6 (including)
ArubaosArubanetworks8.13.0.0 (including)8.13.1.1 (including)
ArubaosArubanetworks10.3.0.0 (including)10.4.1.10 (including)
ArubaosArubanetworks10.5.0.0 (including)10.7.2.2 (including)
ArubaosArubanetworks10.8.0.0 (including)10.8.0.0 (including)

Potential Mitigations

References