CVE Vulnerabilities

CVE-2026-23812

Channel Accessible by Non-Endpoint

Published: Mar 04, 2026 | Modified: Mar 09, 2026
CVSS 3.x
4.2
MEDIUM
Source:
NVD
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate network gateway via a Machine-in-the-Middle (MitM) position.

Weakness

The product does not adequately verify the identity of actors at both ends of a communication channel, or does not adequately ensure the integrity of the channel, in a way that allows the channel to be accessed or influenced by an actor that is not an endpoint.

Affected Software

NameVendorStart VersionEnd Version
ArubaosArubanetworks6.5.4.0 (including)8.10.0.21 (including)
ArubaosArubanetworks8.11.0.0 (including)8.12.0.6 (including)
ArubaosArubanetworks8.13.0.0 (including)8.13.1.1 (including)
ArubaosArubanetworks10.3.0.0 (including)10.4.1.10 (including)
ArubaosArubanetworks10.5.0.0 (including)10.7.2.2 (including)
ArubaosArubanetworks10.8.0.0 (including)10.8.0.0 (including)

Potential Mitigations

References